usually its somewhere there if its not then look here in this folder and look for anything that starts with CanonicalGroupLimited
C:\Users\%USERNAME%\AppData\Local\Packages
Now because we are root in the WSL, we need to remember that all we need to do is basically just look for credentials. go password hunting, so I did in the .bash_history
another alternative is Getting a python shell inside of it.
With root privileges Windows Subsystem for Linux (WSL) allows users to create a bind shell on any port (no elevation needed). Don't know the root password? No problem just set the default user to root W/ .exe --default-user root. Now start your bind shell or reverse.