None of them are keystones. Visit my website and look at the HijackThis section. There is a tutorial/explanation about the log file.