Leaking examples. Use profiling to trace the leak

example1 example2 example3 example4