Used Ghidra Codebrowser to analyse the binary, found the JUMP test to check the secret key and in the Decompile menu I see:
iVar1 = wcscmp(local_1c8,L"sup3rs3cr3tw1d3");
Just submit the secret key to obtain the flag:
Which dimension would you like to examine? 6
[X] That entry is encrypted - please enter your WIDE decryption key: sup3rs3cr3tw1d3
HTB{ZZZZZZZZZZZZZZ}