Below is the crash dump and analysis. I only found one thing online that seemed to involve the same probable cause. I believe the solution from what I did find online was to delete the fntcache.dat file and any fontcache folders in the users appdata/local. Hoping someone can help confirm this or point me in the right direction. This is a brand new RDS server. Thanks.
Microsoft (R) Windows Debugger Version 10.0.17763.132 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\040819-63843-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 10 Kernel Version 17763 MP (24 procs) Free x64
Product: Server, suite: TerminalServer <20000>
Built by: 17763.1.amd64fre.rs5_release.180914-1434
Machine Name:
Kernel base = 0xfffff803`20cb2000 PsLoadedModuleList = 0xfffff803`210cd790
Debug session time: Mon Apr 8 09:10:50.734 2019 (UTC - 4:00)
System Uptime: 0 days 0:20:07.773
Loading Kernel Symbols
...............................................................
................................................................
......................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffbe50db2bbc99, Address of the instruction which caused the bugcheck
Arg3: fffffe003f13f230, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
------------------
KEY_VALUES_STRING: 1
STACKHASH_ANALYSIS: 1
DUMP_CLASS: 1
win32kfull!RFONTOBJ::bInsertGlyphbitsLookaside+ad
ffffbe50`db2bbc99 0f1101 movups xmmword ptr [rcx],xmm0
rax=ffffbe1c40925ab0 rbx=0000000000000001 rcx=0000000000000000
rdx=0000000000000008 rsi=fffffe003f13fd10 rdi=fffffe003f13fd00
rip=ffffbe50db2bbc99 rsp=fffffe003f13fc20 rbp=0000000000000001
r8=00000000ffffffff r9=ffffbe1c42ddc03a r10=00000000ffffffff
r11=fffffe003f13f9d0 r12=0000000000000000 r13=0000000000000001
r14=ffffbe1c40925ab0 r15=0000000000000001
iopl=0 nv up ei pl nz ac pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010213
win32kfull!RFONTOBJ::bInsertGlyphbitsLookaside+0xad:
ffffbe50`db2bbc99 0f1101 movups xmmword ptr [rcx],xmm0 ds:002b:00000000`00000000=????????????????????????????????
Resetting default scope
BLACKBOXPNP: 1 (!blackboxpnp)
CUSTOMER_CRASH_COUNT: 1
fffffe00`3f13fc20 ffffbe50`db27c37e : ffffbe1c`42ddc910 ffffbe50`db0623f1 ffffbe1c`42ddc910 ffffbe50`db403dad : win32kfull!RFONTOBJ::bInsertGlyphbitsLookaside+0xad
fffffe00`3f13fce0 ffffbe50`db29bfe2 : 00000000`00000000 ffffbe1c`42ddc910 fffffe00`3f13fec0 fffffe00`3f13fd74 : win32kfull!FONTOBJ_cGetGlyphs+0x2e
fffffe00`3f13fd40 fffff803`20e76885 : ffffbe1c`40925ab0 ffffbe50`00000001 ffffbe1c`42ddc910 fffffe00`3f13fd74 : win32kfull!NtGdiFONTOBJ_cGetGlyphs+0x122
fffffe00`3f13fdd0 00007ffb`568b62e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000011`3cffbd68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`568b62e4
THREAD_SHA1_HASH_MOD_FUNC: a9532d501db653ddf4115621b75b0545b76a4bbb
win32kfull!RFONTOBJ::bInsertGlyphbitsLookaside+ad
ffffbe50`db2bbc99 0f1101 movups xmmword ptr [rcx],xmm0
---------