This document explains how to use a Vulnerability Protection Profile to block the picasa.exe file without blocking all .exe files.
Steps
Find and Copy the Pattern:
Run Wireshark on the PC.
Download picasa.exe from the website.
Go through the Wireshark capture, of that particular stream, by searching "http" packets (refer to image). Also, you can follow the stream to get more details of the GET packet.
Copy the GET pattern or copy picasa38-setup.exe as shown above.
Create a Custom Signature
Create a Custom Signature under the following tabs: