Tracking Down Memory Leaks, Part 1