Malicious software sometimes uses mutex objects to avoid infecting the system more than once, as well as to coordinate communications among its multiple components on the host. Incident responders can look for known mutex names to spot the presence of malware on the system. To evade detection, some malware avoids using a hardcoded name for its mutex, as is the case with the specimen discussed in this note.
more here..........https://isc.sans.edu/diary/How+Malware+Generates+Mutex+Names+to+Evade+Detection/19429
more here..........https://isc.sans.edu/diary/How+Malware+Generates+Mutex+Names+to+Evade+Detection/19429