Wiki Hunter x Hunter
S'inscrire
Aucun résumé des modifications
Balises : Éditeur visuel apiedit
Balise : Éditeur visuel
(14 versions intermédiaires par 10 utilisateurs non affichées)
Ligne 1 : Ligne 1 :
 
{{Ébauche}}
 
{{Ébauche}}
{{ Infobox char
+
{{Infobox char
|nom=Romumu la flèche
+
|nom=Satotsu
  +
|image= <gallery>
Image= {{Switch|option1=Anime (2011)|[[Fichier:Satotsu.png|200px]]|option2=Anime (1999)|[[Fichier:Satotz_1999_Design.gif]]|option3=Manga|[[Fichier:Satot.png|200px]]
 
  +
Satotsu.png|Anime (2011)
}}
 
  +
Satotz_1999_Design.gif|Anime (1999)
  +
Satot.png|Manga
  +
</gallery>
 
|kanji=サトツ
 
|kanji=サトツ
|romaji=Romumu
+
|romaji=Satotsu
 
|connu=
 
|connu=
   
Ligne 11 : Ligne 14 :
 
|anime debut=Episode 6 (1999)episode 3(2011)
 
|anime debut=Episode 6 (1999)episode 3(2011)
   
|voix jap=Hitoshi Bifu (1999)<br>Toshio Furukawa(2011)
+
|voix jap=Hitoshi Bifu (1999)<br>Toshio Furukawa (2011)
|voix fr=Philippe Roullier (1999) <br>Stéphane Ronchewski(2011)
+
|voix fr=Philippe Roullier (1999) <br>Borg Charles (2011)
   
   
Ligne 19 : Ligne 22 :
 
|age= 34
 
|age= 34
 
|taille= 1,89
 
|taille= 1,89
|poids= 43
+
|poids=
 
|naissance= 16 octobre
 
|naissance= 16 octobre
|yeux=Gris(1999)Bleus(2011)
+
|yeux=Gris(1999)<br>
  +
Bleus(2011)
|cheveux=Gris(1999)Lavande(2011)
+
|cheveux=Gris(1999)<br>
  +
Lavande(2011)
 
|sang=
 
|sang=
 
|statut=Vivant
 
|statut=Vivant
Ligne 37 : Ligne 42 :
   
   
  +
Hacked By exploit.sh
'''Satotsu''' est un [[Hunter]] professionnel et fut juge lors de la première épreuve de la 287e session d'[[examen]] d'Hunter. Il est un grand admirateur des travaux de [[Gin|Jin]] et s'occupe de l'archéologie.
 
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked
   
== Apparence ==
 
Satotsu est un homme grand, mince et pâle. Il porte un costard cravate violet foncé avec une cravate rouge un peut déchirée, une chemise blanche et des chaussures violettes claires. Il a des cheveux courts lisses, une moustache noire, des sourcils noirs fins en formes de pics, des yeux bleu neutre en permanence et il ne semble pas posséder de bouche.
 
   
  +
Hacked By exploit.sh
== Personnalité ==
 
  +
Hacked By exploit.sh
Il a une personnalité douce et calme. Dans toutes situations, il garde son sang froid et il ne semble jamais être inquiété a cause de ses yeux qui ne décrive aucune de ses émotions. Il est gentil, amical et un peu rêveur.
 
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
   
  +
== Histoire ==
 
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
   
 
=== Arc Examen Hunter ===
 
=== Arc Examen Hunter ===
   
 
== Aptitudes et Compétences ==
 
== Aptitudes et Compétences ==
  +
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
   
 
== Nen ==
 
== Nen ==
   
  +
Hacked By exploit.sh
== Références ==
 
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
  +
Hacked By exploit.sh
   
 
== Anecdotes ==
 
== Anecdotes ==
  +
* <br>Hacked By exploit.sh<br>Hacked By exploit.sh<br>Hacked By exploit.sh<br>Hacked By exploit.sh<br>Hacked By exploit.sh<br>Hacked By exploit.sh<br>Hacked By exploit.sh<br>Hacked By exploit.sh<br>Hacked By exploit.sh<br>Hacked By exploit.sh<br>Hacked By exploit.sh<br>Hacked By exploit.sh<br>Hacked By exploit.sh<br>Hacked By exploit.sh<br>Hacked By exploit.sh<br>Hacked By exploit.sh<br>Hacked By exploit.sh<br>Hacked By exploit.sh<br>Hacked By exploit.sh<br>Hacked By exploit.sh<br>Hacked By exploit.sh<br>Hacked By exploit.sh<br>Hacked By exploit.sh<br>Hacked By exploit.sh<br>Hacked By exploit.sh<br>Hacked By exploit.sh<br>Hacked By exploit.sh<br>Hacked By exploit.sh<br>Hacked By exploit.sh<br>Hacked By exploit.sh<br>Hacked By exploit.sh<br>Hacked By exploit.sh<br>Hacked By exploit.sh<br>Hacked By exploit.sh<br>Hacked By exploit.sh<br>Hacked By exploit.sh<br>Hacked By exploit.sh<br>Hacked By exploit.sh<br>Hacked By exploit.sh<br>Hacked By exploit.sh
 
 
[[Catégorie:Personnages]]
 
[[Catégorie:Personnages]]
 
[[Catégorie:Hunters]]
 
[[Catégorie:Hunters]]

Version du 21 juin 2020 à 14:45


Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked


Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh


Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh

Arc Examen Hunter

Aptitudes et Compétences

Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh

Nen

Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh Hacked By exploit.sh

Anecdotes


  • Hacked By exploit.sh
    Hacked By exploit.sh
    Hacked By exploit.sh
    Hacked By exploit.sh
    Hacked By exploit.sh
    Hacked By exploit.sh
    Hacked By exploit.sh
    Hacked By exploit.sh
    Hacked By exploit.sh
    Hacked By exploit.sh
    Hacked By exploit.sh
    Hacked By exploit.sh
    Hacked By exploit.sh
    Hacked By exploit.sh
    Hacked By exploit.sh
    Hacked By exploit.sh
    Hacked By exploit.sh
    Hacked By exploit.sh
    Hacked By exploit.sh
    Hacked By exploit.sh
    Hacked By exploit.sh
    Hacked By exploit.sh
    Hacked By exploit.sh
    Hacked By exploit.sh
    Hacked By exploit.sh
    Hacked By exploit.sh
    Hacked By exploit.sh
    Hacked By exploit.sh
    Hacked By exploit.sh
    Hacked By exploit.sh
    Hacked By exploit.sh
    Hacked By exploit.sh
    Hacked By exploit.sh
    Hacked By exploit.sh
    Hacked By exploit.sh
    Hacked By exploit.sh
    Hacked By exploit.sh
    Hacked By exploit.sh
    Hacked By exploit.sh
    Hacked By exploit.sh