Used Ghidra Codebrowser to analyse the binary, found the JUMP test to check the secret key and in the Decompile menu I see:

iVar1 = wcscmp(local_1c8,L"sup3rs3cr3tw1d3");

Just submit the secret key to obtain the flag:

Which dimension would you like to examine? 6
[X] That entry is encrypted - please enter your WIDE decryption key: sup3rs3cr3tw1d3
HTB{ZZZZZZZZZZZZZZ}