This would be more like reformatting. It makes sense that they used an application that allows editing by adding images, which is why we see an overlay covering up the other user's name. It appears that the same application also allows text editing. Whether they edited the text in question is a different matter, and that would require forensic analysis.
It is interesting that they pasted the info into such an application rather than used screenshots of the original. Perhaps this suggests that this conversation was taken from a database, other messages existed between these two, or taking a screenshot would risk revealing this person's identity.
It could be anything.
When i look at this my first thought is:
They copied a string of messages in slack and pasted it into word, or a similar word processor.
This would be more like reformatting. It makes sense that they used an application that allows editing by adding images, which is why we see an overlay covering up the other user's name. It appears that the same application also allows text editing. Whether they edited the text in question is a different matter, and that would require forensic analysis.
It is interesting that they pasted the info into such an application rather than used screenshots of the original. Perhaps this suggests that this conversation was taken from a database, other messages existed between these two, or taking a screenshot would risk revealing this person's identity.
Depends. If you're tampering with it or not.
if you're doing a report you could copy and paste these things in a word document to keep it from the rest of the data.