Leaking examples. Use profiling to trace the leak
example1
example2
example3
example4