This again is another example of "a little information is dangerous". "Browser fingerprinting" refers to a whole class of techniques that can be used to identify your browser uniquely, based on information it sends the server, how it behaves in certain situations, how fast certain processes take and many other ways. Panopticlick isn't some "magic" website that can find everything that leaks your identity.
Those aren't "browser prints", like I said fingerprinting refers to lots of different techniques. Think of it like a crimescene, browser fingerprinting is like CSI, it's finding the little "breadcrumbs" that your browser leaves behind.
Here are some example situations whereby an addon can help fingerprint you:
You install an addon that sends some random statistics back to its developer at a regular interval. Many addons do this, most collect some kind of statistics. The Tor exit node you are using can see these connections and determine that you have the addon installed. If the addon connects back unencrypted like most do, the exit node can also see the contents of that statistics which can include things like your OS, IP, hostname which they know is linked to whatever other stuff you've been doing via that exit node. Even if that addon connects back via HTTPS You might be the only Tor user with that addon installed on Tor browser, and in any case few people even modify their Tor browser at all. They can then track you across multiple "sessions" and even across multiple Tor exit nodes.
Another example is you install an addon that changes the behaviour of your browser. Lets pretend Tor browser didn't block Flash by default, so you decided to install a flash blocker. A website you load will be able to see that the flash didn't run by default as it's supposed to and know that you have a flash blocker installed. If few Tor users have a flash blocker, this could allow them to track you across multiple sessions.
You what I actually didn't, because I did some more looking into that screenshot and determined via another method that you are likely located in Queensland, Australia. How I figured out your timezone the first time is that the time you took the screenshot is actually in the image data, it was taken less than a minute before you posted it and stored on an NTFS filesystem. I honestly don't really care who you are, I just hope someone out there reading this learns from your mistakes.