Whilst pdftotext.exe is detected 4 times, the detections in themselves aren't conclusive:
1. PUA.Packed.PECompact-1 - This one is having a moan about the fact that it is a packed file - which in itself is no indication it is malicious as not all PECompact files (many .exe files are packed in this way), though generally I would have though it is used to install a program.
2. Suspicious and Heuristic detections are more prone to false positive, plus the heuristic detection is another concern about it being packed.
3. The Trojan.Dropper/Gen is a generic (the Gen bit at the end) detections are also more prone to false positive.
So unfortunately nothing conclusive.
What I can't get my head round is, if pdftotext.exe is a part of the google desktop, how is it involved with Wordfast (my only knowledge of what that does comes from a google search
http://en.wikipedia.org/wiki/Wordfast), if it is a part of the google desktop. What and why is it called in a translation service/application.
So can you take me through this step by step of what you are doing and at what point the pdftotext.exe is launched and intercepted by the autosandbox ?
If you have never used this program, then I would seriously consider uninstalling/removing it from the google desktop. The problem being if this file not being run as you have mentioned has an impack on the Wordfast software and that I really can't understand.