None of them are keystones.
Visit my website and look at the HijackThis section.
There is a tutorial/explanation about the log file.