In Malzilla you have the same functionality you got from XORSearch
Get the binary string (output after UCS2 to Hex).
Go to Hex View tab.
Right-click on left (big) box and chose Paste As Hex.
In the "strings to find" box put the words you search for, one per line. In this case put just "http://"
Click on Find and wait a little bit.
If a XOR key is found, it will appear in "Key:" box.
Click on Apply XOR.
Thats all.
There is one, more scientific way.
After you did "Paste as Hex", click on "Disassemble" button.
Take a look at the very beginning of the code:
E800000000 call +0x00000000
5D pop ebp
83C514 add ebp, 0x00000014
B98B010000 mov ecx, 0x0000018B
B03D mov al, 0x0000003D
304500 xor [ebp], al
Last command in this code fragment is XOR [ebp], al, and we have mov al, 3D before that.
See, the key is in the code.
Happy reversing
