This is a variation of a general Wait Chain (Volume 1, page 482) pattern related to CLR threads. When looking at Stack Trace Collection (Volume 1, page 409) from a complete memory dump we may find threads using a monitor synchronization mechanism:
[... 32-bit ...] 09d2e908 6ba4d409 clr!CLREvent::WaitEx+0x106 09d2e91c 6bb90160 clr!CLREvent::Wait+0x19 09d2e9ac 6bb90256 clr!AwareLock::EnterEpilogHelper+0xa8 09d2e9ec 6bb9029b clr!AwareLock::EnterEpilog+0x42 09d2ea0c 6ba90f78 clr!AwareLock::Enter+0x5f 09d2eaa8 05952499 clr!JIT_MonEnterWorker_Portable+0xf8 [...]
or
[... 64-bit ...] 00000000`2094e230 000007fe`eedc3e3a clr!CLREvent::WaitEx+0xc1 00000000`2094e2d0 000007fe`eedc3d43 clr!AwareLock::EnterEpilogHelper+0xca 00000000`2094e3a0 000007fe`eee3e613 clr!AwareLock::EnterEpilog+0x63 00000000`2094e400 000007ff`007f4c38 clr!JIT_MonEnterWorker_Portable+0×14f [...]
When seeing such threads we may ask for a process memory dump to perform .NET memory dump analysis using SOS or other WinDbg extensions such as in Deadlock (Volume 6, page 135) pattern example for CLR 2 (mscorwks).