This might be a long shot, but for the website re-directs, it could be as simple as checking your hosts file to make sure that they aren't just being redirected from there.
Open regedit and browse to this key:
"\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Serv ices\Tcpip\Parameters" and look for an entry named "DatabasePath", to determine that the virus hasn't changed the location of your hosts file. The default location should be %SystemRoot%\system32\drivers\etc\ where %SystemRoot% is your windows install directory. By default %SystemRoot% will be C:\Windows (so, the default path
should be c:\windows\system32\drivers\etc, and the hosts file should be in the "etc" directory)
Close regedit and browse to the directory specified in that registry key. Open the hosts file with notepad (there is no extension, the file is just named "hosts"). You should see a few lines of text that will be preceeded with a # symbol, and the following two entries:
KEEP THESE ENTRIES
Code:
127.0.0.1 localhost
::1 localhost
Any other lines, especially if they start with 127.0.0.1 and have an antivirus website tagged to them such as this:
Code:
127.0.0.1 avg.com
127.0.0.1 avgfree.com
127.0.0.1 trendmicro.com
127.0.0.1 pccillinsecurity.com
will need to be deleted. after deleting these entries, save the file. changes should take effect immediately, and hopefully if you found anything like this, you will now be able to successfully browse to the sites you need to get to.