Below is the crash dump and analysis. I only found one thing online that seemed to involve the same probable cause. I believe the solution from what I did find online was to delete the fntcache.dat file and any fontcache folders in the users appdata/local. Hoping someone can help confirm this or point me in the right direction. This is a brand new RDS server. Thanks.
Microsoft (R) Windows Debugger Version 10.0.17763.132 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\040819-63843-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 10 Kernel Version 17763 MP (24 procs) Free x64
Product: Server, suite: TerminalServer <20000>
Built by: 17763.1.amd64fre.rs5_release.180914-1434
Machine Name:
Kernel base = 0xfffff803`20cb2000 PsLoadedModuleList = 0xfffff803`210cd790
Debug session time: Mon Apr 8 09:10:50.734 2019 (UTC - 4:00)
System Uptime: 0 days 0:20:07.773
Loading Kernel Symbols
...............................................................
................................................................
......................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, ffffbe50db2bbc99, fffffe003f13f230, 0}
Probably caused by : win32kfull.sys ( win32kfull!RFONTOBJ::bInsertGlyphbitsLookaside+ad )
Followup: MachineOwner
---------
---------
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffbe50db2bbc99, Address of the instruction which caused the bugcheck
Arg3: fffffe003f13f230, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffbe50db2bbc99, Address of the instruction which caused the bugcheck
Arg3: fffffe003f13f230, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
------------------
KEY_VALUES_STRING: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434
SYSTEM_MANUFACTURER: VMware, Inc.
VIRTUAL_MACHINE: VMware
SYSTEM_PRODUCT_NAME: VMware Virtual Platform
SYSTEM_VERSION: None
BIOS_VENDOR: Phoenix Technologies LTD
BIOS_VERSION: 6.00
BIOS_DATE: 07/28/2017
BASEBOARD_MANUFACTURER: Intel Corporation
BASEBOARD_PRODUCT: 440BX Desktop Reference Platform
BASEBOARD_VERSION: None
DUMP_TYPE: 2
BUGCHECK_P1: c0000005
BUGCHECK_P2: ffffbe50db2bbc99
BUGCHECK_P3: fffffe003f13f230
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
FAULTING_IP:
win32kfull!RFONTOBJ::bInsertGlyphbitsLookaside+ad
ffffbe50`db2bbc99 0f1101 movups xmmword ptr [rcx],xmm0
win32kfull!RFONTOBJ::bInsertGlyphbitsLookaside+ad
ffffbe50`db2bbc99 0f1101 movups xmmword ptr [rcx],xmm0
CONTEXT: fffffe003f13f230 -- (.cxr 0xfffffe003f13f230)
rax=ffffbe1c40925ab0 rbx=0000000000000001 rcx=0000000000000000
rdx=0000000000000008 rsi=fffffe003f13fd10 rdi=fffffe003f13fd00
rip=ffffbe50db2bbc99 rsp=fffffe003f13fc20 rbp=0000000000000001
r8=00000000ffffffff r9=ffffbe1c42ddc03a r10=00000000ffffffff
r11=fffffe003f13f9d0 r12=0000000000000000 r13=0000000000000001
r14=ffffbe1c40925ab0 r15=0000000000000001
iopl=0 nv up ei pl nz ac pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010213
win32kfull!RFONTOBJ::bInsertGlyphbitsLookaside+0xad:
ffffbe50`db2bbc99 0f1101 movups xmmword ptr [rcx],xmm0 ds:002b:00000000`00000000=????????????????????????????????
Resetting default scope
rax=ffffbe1c40925ab0 rbx=0000000000000001 rcx=0000000000000000
rdx=0000000000000008 rsi=fffffe003f13fd10 rdi=fffffe003f13fd00
rip=ffffbe50db2bbc99 rsp=fffffe003f13fc20 rbp=0000000000000001
r8=00000000ffffffff r9=ffffbe1c42ddc03a r10=00000000ffffffff
r11=fffffe003f13f9d0 r12=0000000000000000 r13=0000000000000001
r14=ffffbe1c40925ab0 r15=0000000000000001
iopl=0 nv up ei pl nz ac pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010213
win32kfull!RFONTOBJ::bInsertGlyphbitsLookaside+0xad:
ffffbe50`db2bbc99 0f1101 movups xmmword ptr [rcx],xmm0 ds:002b:00000000`00000000=????????????????????????????????
Resetting default scope
CPU_COUNT: 18
CPU_MHZ: 82f
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 55
CPU_STEPPING: 4
CPU_MICROCODE: 6,55,4,0 (F,M,S,R) SIG: 2000050'00000000 (cache) 2000050'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXPNP: 1 (!blackboxpnp)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT_SERVER
BUGCHECK_STR: 0x3B
PROCESS_NAME: PrintIsolationHost.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: TSFW
ANALYSIS_SESSION_TIME: 04-08-2019 14:38:09.0994
ANALYSIS_VERSION: 10.0.17763.132 amd64fre
LAST_CONTROL_TRANSFER: from ffffbe50db27c37e to ffffbe50db2bbc99
STACK_TEXT:
fffffe00`3f13fc20 ffffbe50`db27c37e : ffffbe1c`42ddc910 ffffbe50`db0623f1 ffffbe1c`42ddc910 ffffbe50`db403dad : win32kfull!RFONTOBJ::bInsertGlyphbitsLookaside+0xad
fffffe00`3f13fce0 ffffbe50`db29bfe2 : 00000000`00000000 ffffbe1c`42ddc910 fffffe00`3f13fec0 fffffe00`3f13fd74 : win32kfull!FONTOBJ_cGetGlyphs+0x2e
fffffe00`3f13fd40 fffff803`20e76885 : ffffbe1c`40925ab0 ffffbe50`00000001 ffffbe1c`42ddc910 fffffe00`3f13fd74 : win32kfull!NtGdiFONTOBJ_cGetGlyphs+0x122
fffffe00`3f13fdd0 00007ffb`568b62e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000011`3cffbd68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`568b62e4
fffffe00`3f13fc20 ffffbe50`db27c37e : ffffbe1c`42ddc910 ffffbe50`db0623f1 ffffbe1c`42ddc910 ffffbe50`db403dad : win32kfull!RFONTOBJ::bInsertGlyphbitsLookaside+0xad
fffffe00`3f13fce0 ffffbe50`db29bfe2 : 00000000`00000000 ffffbe1c`42ddc910 fffffe00`3f13fec0 fffffe00`3f13fd74 : win32kfull!FONTOBJ_cGetGlyphs+0x2e
fffffe00`3f13fd40 fffff803`20e76885 : ffffbe1c`40925ab0 ffffbe50`00000001 ffffbe1c`42ddc910 fffffe00`3f13fd74 : win32kfull!NtGdiFONTOBJ_cGetGlyphs+0x122
fffffe00`3f13fdd0 00007ffb`568b62e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000011`3cffbd68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`568b62e4
THREAD_SHA1_HASH_MOD_FUNC: a9532d501db653ddf4115621b75b0545b76a4bbb
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 46798b393430d99ef49f58ebf009fb18a67143d6
THREAD_SHA1_HASH_MOD: 4b0b617a0dfdccf32d810bf06e973af5ab544eda
FOLLOWUP_IP:
win32kfull!RFONTOBJ::bInsertGlyphbitsLookaside+ad
ffffbe50`db2bbc99 0f1101 movups xmmword ptr [rcx],xmm0
win32kfull!RFONTOBJ::bInsertGlyphbitsLookaside+ad
ffffbe50`db2bbc99 0f1101 movups xmmword ptr [rcx],xmm0
FAULT_INSTR_CODE: 4801110f
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: win32kfull!RFONTOBJ::bInsertGlyphbitsLookaside+ad
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4161d1d6
IMAGE_VERSION: 10.0.17763.404
STACK_COMMAND: .cxr 0xfffffe003f13f230 ; kb
BUCKET_ID_FUNC_OFFSET: ad
FAILURE_BUCKET_ID: 0x3B_win32kfull!RFONTOBJ::bInsertGlyphbitsLookaside
BUCKET_ID: 0x3B_win32kfull!RFONTOBJ::bInsertGlyphbitsLookaside
PRIMARY_PROBLEM_CLASS: 0x3B_win32kfull!RFONTOBJ::bInsertGlyphbitsLookaside
TARGET_TIME: 2019-04-08T13:10:50.000Z
OSBUILD: 17763
OSSERVICEPACK: 404
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 131088
PRODUCT_TYPE: 3
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 Server TerminalServer
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2022-05-13 05:29:43
BUILDDATESTAMP_STR: 180914-1434
BUILDLAB_STR: rs5_release
BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434
ANALYSIS_SESSION_ELAPSED_TIME: 1a3d
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_win32kfull!rfontobj::binsertglyphbitslookaside
FAILURE_ID_HASH: {ce603602-155f-03d7-d64e-0b9170fa0d25}
Followup: MachineOwner
---------
---------