1. Remember to turn on the `pretty print` in `DevTools` (As mentioned in Hint, the source code is [obfuscated](https://obfuscator.io/).

2. I set several breakpoints (the red dots) to see how the code works, and what contains in the array `_0x5a46` looks suspicious
3. I grab some possible elements inside, assemble them then get `picoCTF{not_this_again_50a029}`, and it turns out to be correct :)
<hr>
Another method (credit to [this article](https://ithelp.ithome.com.tw/articles/10246749)) is to use `console` to inspect the stored items like this:

The output is overlapped, 
(img from the article)
So we just have to use part of them.