Tracking Down Memory Leaks, Part 2