Also won't do you much good now, given there is no virus to deal with, but for the record, one of the (several) tools I use to identify malware is SuperAntiSpyware.
One problem is that this looks like, and has been ripped off as, fake anti-malware, so be sure you're getting a legit version and not one that's been re-engineered to actually infect your computer. (Or something that's been made to look like it.) I forget exactly where I got my original copy, which now happily sits on a number of my memory sticks, so be careful in your Google-Fu.
But, in particular, the version I use is a single .com file (old-fashioned executable). You can download this and several other alternate executable versions (.scr is another, IIRC) so that "anti-malware aware malwares", such as ones that complain when "mbam*.exe" is being run, and thus stops you from installing MalwareBytes or using an already-installed copy of same, can be got around. It's a single file and always needs updating each time it's started (the installable version would probably keep its information between one run and another), so Safe Mode With Networking and a valid ethernet connection to the internet is generally the environment I run it in. (Which also tends to nullify the "executable-hooking" aspects of the malware, but that might not be universally true.)
As to the reality of your situation, I can't quite believe that an ISP is doing what I think you're saying its doing. I know I'd certainly not appreciate it.