Decided to debug myself here are the bugcheck analysis:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
PAGE_FAULT_BEYOND_END_OF_ALLOCATION (cd)
N bytes of memory was allocated and more than N bytes are being referenced.
This cannot be protected by try-except.
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffff858c359b1000, memory referenced
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation
Arg3: fffff80280fdc76b, if non-zero, the address which referenced memory.
Arg4: 0000000000000000, Mm internal code.
Debugging Details:
------------------
Could not read faulting driver name
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING:  10.0.14393.1715 (rs1_release_inmarket.170906-1810)
DUMP_TYPE:  2
BUGCHECK_P1: ffff858c359b1000
BUGCHECK_P2: 2
BUGCHECK_P3: fffff80280fdc76b
BUGCHECK_P4: 0
READ_ADDRESS: fffff80281220338: Unable to get MiVisibleState
 ffff858c359b1000 
FAULTING_IP: 
nt!memcpy+2b
fffff802`80fdc76b 488941f8        mov     qword ptr [rcx-8],rax
MM_INTERNAL_CODE:  0
CPU_COUNT: 8
CPU_MHZ: 95a
CPU_VENDOR:  GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3c
CPU_STEPPING: 3
CUSTOMER_CRASH_COUNT:  1
DEFAULT_BUCKET_ID:  CODE_CORRUPTION
BUGCHECK_STR:  0xCD
PROCESS_NAME:  GameMon64.des
CURRENT_IRQL:  2
ANALYSIS_SESSION_HOST:  WINDOWSPC
ANALYSIS_SESSION_TIME:  09-14-2017 00:42:45.0867
ANALYSIS_VERSION: 10.0.14321.1024 amd64fre
TRAP_FRAME:  ffff8b80233ac390 -- (.trap 0xffff8b80233ac390)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff858c359b1008
rdx=000005f3ed9fb5a8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80280fdc76b rsp=ffff8b80233ac528 rbp=fffff80281296dd0
 r8=0000000000000018  r9=0000000000000000 r10=00000000000008a0
r11=ffff858c359b0ff0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!memcpy+0x2b:
fffff802`80fdc76b 488941f8        mov     qword ptr [rcx-8],rax ds:ffff858c`359b1000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER:  from fffff80280ffaaae to fffff80280fd08b0
STACK_TEXT:  
ffff8b80`233ac098 fffff802`80ffaaae : 00000000`00000050 ffff858c`359b1000 00000000`00000002 ffff8b80`233ac390 : nt!KeBugCheckEx
ffff8b80`233ac0a0 fffff802`80ed5f7d : 00000000`00000002 00000000`00000000 ffff8b80`233ac390 ffff858c`359b1000 : nt!MiSystemFault+0x10004e
ffff8b80`233ac190 fffff802`80fd9efc : ffff0000`0000027f ffffb608`788bd840 00000000`00000000 ffff8b80`00001f80 : nt!MmAccessFault+0x27d
ffff8b80`233ac390 fffff802`80fdc76b : fffff80f`46c3d5f6 00000000`00000000 c0000022`00000000 00000000`00000000 : nt!KiPageFault+0x13c
ffff8b80`233ac528 fffff80f`46c3d5f6 : 00000000`00000000 c0000022`00000000 00000000`00000000 ffffb608`85e9def0 : nt!memcpy+0x2b
ffff8b80`233ac530 00000000`00000000 : c0000022`00000000 00000000`00000000 ffffb608`85e9def0 00000000`00000000 : dump_wmimmc+0x23d5f6
STACK_COMMAND:  kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff80280ed56d3 - nt!MiGetFreeOrZeroPage+2e3
    [ fa:f8 ]
    fffff80280ed5729 - nt!MiGetFreeOrZeroPage+339 (+0x56)
    [ fa:f8 ]
2 errors : !nt (fffff80280ed56d3-fffff80280ed5729)
MODULE_NAME: memory_corruption
IMAGE_NAME:  memory_corruption
FOLLOWUP_NAME:  memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP:  0
MEMORY_CORRUPTOR:  ONE_BIT_LARGE
FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT_LARGE
BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT_LARGE
PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_ONE_BIT_LARGE
TARGET_TIME:  2017-09-14T07:14:27.000Z
OSBUILD:  14393
OSSERVICEPACK:  1715
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK:  784
PRODUCT_TYPE:  1
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:  
USER_LCID:  0
OSBUILD_TIMESTAMP:  2017-09-06 21:54:57
BUILDDATESTAMP_STR:  170906-1810
BUILDLAB_STR:  rs1_release_inmarket
BUILDOSVER_STR:  10.0.14393.1715
ANALYSIS_SESSION_ELAPSED_TIME: 11f3
ANALYSIS_SOURCE:  KM
FAILURE_ID_HASH_STRING:  km:memory_corruption_one_bit_large
FAILURE_ID_HASH:  {31545515-196b-fab5-2300-9ce714226f43}
Followup:     memory_corruption
It says memory corruption by GameMon64.des. I know this is a gameguard process but it didn't cause BSOD before, any thoughts why?