Describe the visible information. If it’s a screenshot of a registry or log file, list the key entries like "Last Used" software or "Mounted Devices". 3. Creative/Social Media Post Write-up
Mention the device, OS, and browser version where the screenshot was taken. Observations: Trigger: What action was performed right before this shot?
Note the file size, MD5/SHA-256 hash, and naming convention.
Explain why this state is a problem (e.g., "Prevents user from completing payment"). 2. Digital Forensics/Analysis Write-up
If this screenshot captures an error or a specific system state, use this structured format to make it actionable for developers or IT support.