The aim of this paper is to define the abstract domain, abstract operator, abstract semantic, the environments and states of disassembled executable codes as well as a way to analysis the disassembled executable codes. Nowadays, static analysis on disassembled code going to grow. Reverse engineering and malware analysis use this technique. Thus, we tried to perform pluralization the requirements of static analysis by abstract interpretation as well as report some specific and advantageous notes in this paper. In addition, we present an algorithm to obtain the control ow graph of disassembled code.