00:00
Loading…
F.A.C.E.S.
Forensic Analysis, Compendium & Evidence System
Enter passcode
F.A.C.E.S. v0.1.0 · 2026-05-06 · Internal — privileged work product
Privileged investigative work product

F.A.C.E.S.

Forensic Analysis, Compendium & Evidence System

UAE Dell Server Investigation — "Mirage by MAG / Trade Mirage" investment-fraud operation, corporate parent Matajar Group, UAE-side and German-side operators.

SystemF.A.C.E.S. · DUBAI-SERVER-agy StatusActive investigation Evidence collected2026-04-30 (on-site, Sharjah) Report version0.1.0 — 2026-05-05 Prepared byDivergence Systems Lead contactinfo@divergence.systems On-site staffApo · Fox DistributionInternal first; regulator/law-enforcement on counsel approval

Document handling notice

This dossier is privileged investigative work product prepared by Divergence Systems. It is intended for internal review first, then — on counsel approval — onward distribution to designated regulator and law-enforcement counterparts. It is not a press document, marketing collateral, or public release.

Evidence in this dossier was collected on-site on 2026-04-30 by Divergence Systems staff (Apo and Fox). Hardware and notebooks were photographed in situ; the on-site team's Surface tablet appearing on the seized-network screenshots (host TABLET-JVQFGF9E, 192.168.1.25) is investigation kit and is excluded from operator inventory throughout this report.

To cite a specific finding, use the format DUBAI-SERVER-agy report v0.1.0 §X.Y and reference the underlying archive file under project/case-archive/archive/NN_*.md. Forward any redistribution request to info@divergence.systems before sharing.

Executive summary

1.1   Case in one paragraph

A two-tier investment-fraud operation under the "Mirage" brand — regulator-confirmed by ADGM/FSRA on 2025-12-04 as "Mirage by MAG Investment LLC / Trade Mirage", with infrastructure seized on-site by Divergence Systems on 2026-04-30. The operation is the investment arm of Matajar Group — a Dubai corporate parent owned by Muhammed Dhilshad / Dilshad Muhammed — with a German operator-side cell stamped in seized notebooks as "MIRAGE E-TRADE LLC" (Sharjah, P.O. Box 5045), those notebooks confirmed by on-site staff to belong to Dennis Poschner (Offenburg, Germany). The advertised model is a "physics-of-finance" 6-coin (ETH/SOL/DOGE/BCH/TON/FIL) algorithmic trading bot promising 12% per 30 days, with reinvestment into a target portfolio of 229–289 Dubai houses worth USD 1.144 billion. The actual operational mechanic — per third-party reviews of trademirage.com — is a withdrawal-trap fee-stacking advance-fee fraud. [1]

1.2   The single highest-priority finding

Dilshad Muhammed publicly self-identifies Trade Mirage as part of the Matajar Group on his own LinkedIn. In his 2025 New Year LinkedIn post, the hashtag bundle reads:

Smoking-gun hashtag bundle (Dilshad Muhammed, LinkedIn, ~2025-01-01)
#HappyNewYear #Welcome2025 #matajargroup #bizfuel #matajarecommerce #matajarrealestate #myopinion #trademirage #sheikhzayedrd #dubai #uae #dhilshadmatajar
Source: linkedin.com/posts/dilshad-muhammed-29590171_happynewyear-welcome2025-matajargroup-activity-7280134503208005632-z4rD  ·  captured publicly without authentication, 2026-05-05. [15]

This places #trademirage alphabetically and operationally adjacent to four confirmed Matajar subsidiaries (#matajargroup, #bizfuel, #matajarecommerce, #matajarrealestate) and to the operator's own personal-brand tag #dhilshadmatajar. It is a direct operator-side admission that Trade Mirage is a Matajar product — removing any plausible-deniability defence that the two operations were unrelated. Time-critical: archive to Wayback / archive.today and screenshot before the post is edited or deleted.

A subsequent research pass [16] surfaced at least 19 dedicated Trade Mirage / Mirage International / Mirage Trading video titles on Dilshad's personal YouTube channel @Dhilshadthoughts — including a 2025-03-18 Short literally titled Trade mirage By #Matajar Group #matajargroup — establishing a second independent operator-side admission across a second platform. The same pass established Mirage International Trading as a Matajar entity since 2006 and the Mirage by MAG Investment LLC operating licence as continuously held since 2010, both per Matajar's own About-Us page. The corporate ecosystem behind the ADGM-flagged scheme is 20 years old and multi-jurisdiction, not a recent shell.

1.3   Top-level entity map

Figure 1.1 — Top-level entity map. An SVG entity-relation diagram is rendered here at build time from case-archive/archive/graph/nodes_edges.json (filtered to layers ≤ 7). Lines indicate identified relationships; dotted lines indicate suspected relationships pending confirmation. Pending build-time renderer.

                        Dennis Poschner (DE)
                        Offenburg, Germany
                  e36-verdeck.de (auto-parts cover)
                       ▼
            Seized handwritten notebooks
            "MIRAGE E-TRADE LLC" Sharjah stamp
            6-coin DSA model + 12%/month + $1.14B Dubai-property exit plan
                       │
                       ▼ (likely partnership / franchise)
                       │
               Muhammed Dhilshad (UAE Golden Visa)
               Matajar Group (Dubai) — parent
               ├── Mirage by MAG Investment LLC ◀── ADGM/FSRA fraud alert (2025-12-04)
               │     └── Trade Mirage (trademirage.com — now parked)
               │     └── Instagram @mirage_by_mag
               ├── MAG NEXA (4%/month investment vehicle)
               ├── Matajar E-Commerce / Dabbab Express (legitimate cover)
               ├── D Cars, D Express, Bizfuel, Moms & Wives, Get Lead
               └── Metric Motive (Calicut, India)

1.4   Suspect summary cards

Operator — German side

Dennis Poschner

Technical / quantitative — author of the seized notebooks.

Address
Fischerstraße 1d, 77652 Offenburg, Germany
Cover business
e36-verdeck.de (BMW E36 convertible-top trade)
Hardware procurement
Coreto AG invoice (R960, EUR 481,180.13)
Notebook ownership
Confirmed by on-site staff on 2026-04-30
Confidence: HIGH [3][4]
Operator — UAE side

Muhammed Dhilshad / Dilshad Muhammed

Corporate / marketing — CEO of Matajar E-Commerce LLC, public face of Matajar Group.

Location
Dubai, UAE — UAE Golden Visa holder
Corporate
CEO Matajar E-Commerce; controls Matajar Group's "Mirage by MAG" brand family
Domain control
matajargroup.com — registered to "Dhilshad" per WHOIS
Regulator status
Mirage by MAG Investment LLC named by ADGM/FSRA (2025-12-04)
Confidence: HIGH [7][8][15]

1.5   Five-tier investment-product ladder

The Matajar Group runs five concurrent yield-promise products at five distinct entry points — all openly published on operator-controlled pages.[17] The lowest tier (D Express subscription, AED 6,000 entry) is the gateway product framed as a grocery-loyalty subscription; the apex tier (Trade Mirage, 12% / month) is the ADGM-flagged forex bot. [13]

Trade Mirage  Mirage by MAG Investment LLC — flagship 12% / mo
Dabbab Express logistics  min AED 100,000, 1-yr contract 4–6% / mo
D Express subscription  4 tiers, AED 6k / 12k / 25k / 60k entry 5% / mo
MAG NEXA  Bali resort venture, min USD 25k, 3-yr 4% / mo
DCARS fleet  "Drive Returns, Not Just Cars" — asset-backed profit-share monthly / quarterly

Operationally critical: Meta is still serving ads for both Mirage by MAG and Trade Mirage with start dates as recent as 2026-04-17134 days after the ADGM/FSRA fraud alert. By contrast, Google Ads Transparency Center reports 0 ads across all 5 operator domains in the UAE, so the operator's paid-acquisition funnel runs exclusively through Meta. None of the 8 operator-controlled domains have ever been archived by Wayback Machine — the negative finding is itself anomalous and suggests deliberate archive-suppression. [17]

1.6   What has been done · what remains

WorkstreamDone in this reportPending
Hardware identification R730 + asset tags + on-site photos digitised Read-only disk imaging; ESXi + iDRAC log pull
Notebook digitisation All 81 photographed pages digitised (model, formulas, exit narrative, stamps) Counsel review of handwriting attribution chain-of-custody
Suspect identification Dennis Poschner (DE) + Muhammed Dhilshad (UAE) — both HIGH confidence Photographic ID confirmation (PimEyes / Yandex face search with auth)
Corporate family Matajar Group → 3 "Mirage by MAG" sister LLCs documented; brand-collision exclusions Sharjah SEDD + Dubai DED + ADGM register lookups
Domain WHOIS 5 operator-controlled domains documented, subpoena targets identified GoDaddy / DBP / Wix disclosure (US legal process)
Social-media archive Public layer captured (LinkedIn posts, YouTube channel mirror, Egyptian broker) Authenticated-session capture for the 47-employee LinkedIn list, IG, FB
Regulator action ADGM/FSRA alert (2025-12-04) captured BaFin (DE), Sharjah SEDD, Dubai DED, Egyptian FRA, Arizona AZCC

Regulatory & evidentiary anchors

§2.1 ADGM/FSRA fraud alert (2025-12-04). Full quote of the alert + screenshot will render here at build time from case-archive/archive/01_adgm_alert.md.

§2.2 Chain of custody — 2026-04-30 seizure. Photo strip of 4 hero images, captioned "Figure 2.1 — Hardware seizure sequence". Source: case-evidence/photos/hardware/.

§2.3 Seized hardware — Dell PowerEdge R730 with "MIRAGE E-TRADE LLC" stamp. Annotated photo of the asset tag and chassis stamp. Source: visual-evidence-sequence.md.

§2.4 Seized notebooks — 81 photographed pages. Mosaic of 9 representative pages with captions. Source: documents-analysis.md.

Suspect dossiers

3.1   Dennis Poschner — operator, German side

The seized notebooks were confirmed on-site (2026-04-30) by Divergence Systems staff to belong to and have been written by Dennis Poschner. They contain the full "Data Search Algorithm" (DSA) / "BTC Search Algorithm" (BSA) derivation, the 12%-per-30-days formula P_n(h) = h · n / 21,600,000, and the USD 1.144 billion exit narrative — all consistent with a single author's handwriting and reasoning style across the 81 pages.

3.1.1   Identification

3.1.2   Evidence chain

3.1.3   What we don't have yet

3.2   Muhammed Dhilshad / Dilshad Muhammed — operator, UAE side

3.2.1   Identification

3.2.2   Evidence chain

3.2.3   Captured public posts (3 of 492)

DateSubjectSignificance
~2023Matajar grocery-app promo (Dubai/Sharjah/AbuDhabi/Ajman, 24+ categories) Confirms the legitimate-cover side of Matajar's e-commerce business.
~2024"Cars Now" app: luxury-car 2-yr lease, "no bank statements, cheques, or deposits" Language consistent with bypassing bank-statement audit trail. Possibly a third Matajar car-rental brand alongside DCARS.
2025-01-01New Year post (the smoking-gun hashtag bundle) Direct operator-side admission that #trademirage is a Matajar brand.

3.3   Anthony Maggio — US-side contact (low confidence)

Anthony Maggio is the named contact on Arizona LLC file 02365995 ("MIRAGE BROKERAGE COMPANY", incorporated 1991), and he is independently the founder of Forza Capital Funding, Inc. (Scottsdale, AZ — a mortgage-broker firm). Forza's Scottsdale address differs from the AZ Mirage Brokerage's Tempe address, which is consistent with Maggio acting as a registered-agent / nominee for the AZ LLC rather than a beneficial owner. He is a deposition witness — his fee-for-service records would identify the actual beneficial owner of the AZ LLC. [12]

Corporate family — Matajar Group → Mirage by MAG

§4.1 Matajar Group umbrella. Org chart (Figure 4.1) rendered from case-archive/archive/07_matajar_group_parent_entity.md.

§4.2 The three "Mirage by MAG" sister LLCs. Three-card row from case-archive/archive/13_mirage_by_mag_corporate_family.md.

§4.3 Hidden D Express subscription scheme. Direct quote of the AED 6,000 / AED 300 monthly returns wording + comparative chart.

§4.4 Brand-collision exclusions. Diagram + reasoning from case-archive/archive/14_brand_confusion_disambiguation.md, with NEXA Bali flagged as possible affinity-fraud lead.

Domain & infrastructure

§5.1 Operator-controlled domains — table from 06_whois_three_mirage_domains.md + 13_mirage_by_mag_corporate_family.md.

§5.2 WHOIS evidence and subpoena targets — named third parties + jurisdictional process for each.

§5.3 Hosting + LAN topology (Figure 5.1) — diagram with the Divergence Systems Surface (192.168.1.25) clearly labelled as team kit.

The advertised model — "physics of finance"

§6.1 The 6-coin DSA / BSA framework. Reproduction + typeset version from documents-analysis.md.

§6.2 The 12%-per-30-days formula. P_n(h) = h · n / 21,600,000.

§6.3 The exit narrative — USD 1.144B / 229–289 Dubai houses.

§6.4 The actual mechanic — Zorya Capital review of trademirage.com.

Network graph (interactive 3D visualisation)

§7.1 Reading guide — layer / shape / edge legend.

§7.2 Embedded 3D viz — inlined from case-archive/archive/graph/index.html + nodes_edges.json.

§7.3 Static rendering — pre-rendered PNG snapshot at three angles.

Tracking matrices

§8.1 Keyword tracking matrix — interactive HTML table from 00_keyword_tracking_matrix.md.

§8.2 Visual reference matrix — same format applied to image assets.

Action items — open as of report freeze

9.1   Time-critical

#ActionStatus
1Wayback / archive.today snapshots of trademirage.com, matajargroup.com, e36-verdeck.de, etrade-miragebrokerage.netPending
2Manual archive of all suspect social media (public layer captured this report; login-walled layer flagged)Done (partial)
3yt-dlp mirror of @Dhilshadthoughts (142 videos, metadata + descriptions + multilingual subtitles)Done
4Capture 47-employee list on Mirage Brokerage Co LinkedIn (6 names + corporate facts captured; 41 names still login-walled)Done (partial)

9.2   Subpoena / disclosure tier

Pending render. See archive/INDEX.md §9.

9.3   Government register lookups

Pending render. Sharjah SEDD · Dubai DED · ADGM · Egyptian FRA · Arizona AZCC · Indian MCA.

9.4   Forensic on-server

Pending render. Image disks read-only · ESXi/iDRAC log pull · VM inventory · MAC cross-reference.

9.5   OSINT lookups (cheap, high signal-to-noise)

Pending render. Reverse-image searches · PimEyes · Yandex face · HaveIBeenPwned + IntelX + Dehashed for known emails.

External services this machine powered

The seized Dell PowerEdge R730 is the technical backbone of an integrated multi-product fraud pipeline. Each public-facing brand below is a distinct customer-acquisition surface that ultimately routes capital through the operator's infrastructure. ADGM/FSRA has flagged one of these brands; the others remain operational and unflagged at time of report.

Service 1 — Flagship fraud (regulator-confirmed)

Trade Mirage — operating under Mirage by MAG Investment LLC

Forex / 6-coin algorithmic trading bot. ADGM/FSRA fraud alert published 2025-12-04.

Pitch
"Globally recognised forex trading platform" / "ADGM-accredited" (false claim) / 12% per 30 days
Mechanic
Withdrawal-trap fee-stack — confirmed by third-party review[5]
Domains
trademirage.com (parked); mirage-web-six.vercel.app (Vercel-removed clone); Instagram @mirage_by_mag
Status
Site parked but Meta ads still active as recently as 2026-04-17 (134 days post-ADGM alert)[17]
Subpoena targets
GoDaddy / Domains By Proxy (registrant); Meta Platforms (ad-account billing identity); Coinbase (routing exchange per notebook page 53[18])
Confirmed fraud — regulator-flagged
Service 2 — Gateway tier (highest active ad spend)

D Express subscription investment — licensed by Mirage by Mag L.L.C.

Grocery-delivery app with 4-tier subscription investment plan. 30 active Meta ad creatives — the most-advertised brand.[17]

Pitch (verbatim)
"Choose a Subscription Plan. Start with a minimum investment (e.g., AED 6,000). Earn AED 300 monthly as returns. Cancel Anytime, Full Refund — no questions asked."[17]
Tier ladder
4 visible tiers: 300 / 600 / 1250 / 3000 (= AED 6k / 12k / 25k / 60k entry). 5%/month nominal.
Customer-service WhatsApp
+91 9037812288 behind a UAE-displayed phone — directly evidences Calicut call-centre on the front line
iOS app
apps.apple.com/in/app/d-express/id6740457644registered in Indian App Store, not UAE — jurisdictional anomaly
Subpoena targets
Apple Inc. (developer-account billing); Google Play / Alphabet (Android dev account); Meta Platforms (FB ad-account billing for the 30 active creatives)
Operationally active — yield promise
Service 3 — Asset-backed yield surface

DCARS investment program — Mirage by Mag Car Rental L.L.C.

Car-rental and lease-to-own front; investment program at dcars.ae/investments/.

Pitch (verbatim)
"Drive Returns, Not Just Cars / Double Your Income Investment UAE / Asset-Backed Security"
Mechanic
Monthly or quarterly profit-sharing on fleet. CTA WhatsApp: wa.me/+971502164944
Status
Live; 6 active Meta ad creatives
Subpoena targets
UAE DED (Mirage by Mag Car Rental L.L.C. licence + shareholders); WhatsApp Business / Meta (chat archives)
Operationally active — yield promise
Service 4 — Flagship logistics tier

Dabbab Express Logistics Investment — matajargroup.com/subsidiaries/

Logistics-fleet investment fund openly published on the corporate site.

Pitch (verbatim)
"Invest in Dabbab Express logistics for a secure 4-6% monthly return on a 100,000 AED investment. Our one-year contract ensures steady profit in the thriving UAE e-commerce sector."[17]
Mechanic
1-year lock-in. AED 100,000 minimum entry → AED 4,000–6,000 monthly = 48–72% annualised nominal
Subpoena targets
UAE DED (Dabbab Express LLC formerly Matajar E-Commerce LLC); Abreco Group (logistics partner — would have shipping-volume records)
Operationally active — yield promise
Service 5 — Premium / international tier

MAG NEXA premium investment — now repositioned as global holding

"Wellness, retreats, luxury resorts in Thailand, UAE, Europe, Bali."

Pitch
USD 25,000 minimum / 4% monthly target = 48% annualised / 36-month roadmap
Affinity-fraud lead
Possibly impersonating real Bali developer NEXA (nexauniverse.com) — see [14]
2025 repositioning
Mag Nexa is now declared by Dilshad as the global holding above Matajar Group, with offices in Dubai, Bangkok, Calicut[18]
Subpoena targets
Thailand DBD register (Mag Nexa Co., Ltd. Bangkok director list + Thai bank); NEXA Bali (confirm/deny licensing relationship)
Operationally active — yield promise
Service 6 — Affinity-fraud / MLM-recruitment tier

Moms & Wives — momsandwives.com

Skill-marketplace / women-empowerment platform. 24 active Meta ads. iOS + Android apps live.

Pitch
"Earnings From Home" / "global success story" / skill-registration funnel for housewives, single mothers, skilled women
Mechanic
Login portal (Google SSO); "skill registration" — fee structure not yet captured
Subpoena targets
Google (SSO logs + Play Store dev account com.matajar.momsandwives); Apple (iOS dev account)
Operationally active — affinity-fraud structure
Service 7 — Legitimate-cover / infrastructure layer

Bizfuel · GetLead · Wholzale · Baqalat Express · Cars Now

B2B SaaS, CRM, B2B e-commerce — provides the day-to-day operational cover for the yield-promise layer above.

Operational role
Bizfuel + Vansale = field-sales SaaS; GetLead CRM (Calicut, 3,500+ agents) = boiler-room CRM with auto-dialer/IVR/WhatsApp/telecalling
Significance
The infrastructure that the call-centre uses to manage the yield-promise lead funnel at scale. 3,500+ telecaller seats is industrial-scale capacity.
Subpoena targets
Indian MCA (Getlead Analytics Pvt Ltd; Coders Bunch Software Solutions; Metric Motive); Indian GST register
Infrastructure — supports fraud surfaces
Service 8 — Egyptian arm (under Mirage Holding umbrella)

Mirage Brokerage Co (EGX member 1148) — etrade-miragebrokerage.net

Real EGX-registered Egyptian broker since 2006-11-29. Twitter @BrokerageMirage bio names parent as "Mirage Holding Company".

Brand identity
"MIRAGE HOLDING INVESTMENT" — gradient MH logo on the trading-portal screenshot[17]
Linked address
LinkedIn About-section claims 4500 S Lakeshore Dr Tempe AZ as their US presence — operator self-attested dual-jurisdiction[15]
Capital
EGP 25M paid capital (~USD 525k)
Subpoena targets
Egyptian FRA (permitted-products list — does it offer crypto?); Sharjah SEDD; Arizona AZCC for the Tempe LLC
Real broker — but linked to operator umbrella
Service 9 — Misrepresentation flag

Do-Verify — do-verify.com

Marketed by Matajar/Mag Nexa as a "fast KYC, trusted onboarding and compliance workflows" platform. The actual published product is a generic checklist / to-do app.[18]

Discrepancy
Claimed identity-verification platform vs. published checklist app — operator marketing materially misrepresents the product
Significance
Either Do-Verify is being repositioned as KYC silently, OR the "KYC platform" framing is a deceptive credentialing for the holding group, OR the real KYC operation is hosted elsewhere — the operator gains the appearance of running compliance infrastructure
Subpoena targets
Domain registrar for do-verify.com; Google (since the product offers Google-SSO sign-in via console.do-verify.com)
Discrepancy flagged

Money-flow projection

The figures below are not Divergence Systems estimates. They are the operator's own arithmetic, taken verbatim from operator-controlled web pages and the seized handwritten notebooks. The projection therefore reads what the system was designed to move — the actual realised flows are an open question pending forensic disk imaging, Coinbase disclosure, and victim testimony.

11.1   Per-product unit economics — operator's own figures

ProductMin entryStated monthly returnStated annualised nominalLock-in
D Express tier-300 AED 6,000 ≈ USD 1,633 AED 300 ≈ USD 82 (5%) ~80% (12 × 5%) None ("full refund")
D Express tier-600 AED 12,000 ≈ USD 3,267 AED 600 ≈ USD 163 (5%) ~80% None
D Express tier-1250 AED 25,000 ≈ USD 6,807 AED 1,250 ≈ USD 340 (5%) ~80% None
D Express tier-3000 AED 60,000 ≈ USD 16,338 AED 3,000 ≈ USD 817 (5%) ~80% None
Logistics investment AED 100,000 ≈ USD 27,228 AED 4,000–6,000 (4–6%) 48%–72% 1 year
MAG NEXA premium USD 25,000 USD 1,000 (4%) 48% 3 years
Trade Mirage (not published) 12% per 30 days ~290% (compounded) Withdrawal-trapped per Zorya[5]

11.2   Per-investor lifetime — Trade Mirage exit narrative

The seized notebooks contain a fully-worked exit narrative on pages 70–72:

  $1,144,900,000  total exit target
  ÷  ($4M per house, 1 sample)   = 286 Dubai houses
  ÷  ($5M per house, 1 sample)   = 229 Dubai houses
  → target portfolio: 229–289 Dubai-property residences

  Reverse-derive per-investor capture for a 6-year ramp at 12%/m compounding:
  $1,144,900,000 / (1.12)^72 ≈ $358 (incoming first month, theoretical)
  — but this is the maths-pitch, not the realised flow. The withdrawal-trap
  fee-stack (per Zorya) extracts USD 5–25K per fooled investor before they
  abandon the platform.
    

Realistic capture per fooled investor (industry baseline for withdrawal-trap forex bots): USD 5,000–25,000 each. To approach the operator's stated $1.144 B exit target via this single product would require approximately 45,000–230,000 fooled investors. The five-tier ladder is therefore an investor-segmentation funnel — each tier captures a slice of the population with a price-discriminated entry point, summed.

11.3   Public claimed metrics from the operator's own corporate pages

The operator publishes inconsistent statistics across two corporate sites — both attributed to the same group, both naming Dilshad as CEO:

Metricmatajargroup.commagnexa.aiΔ
App downloads145,000+145K+matches
Active users50,000+7.9 million +×158
Loyal users7,000+2.7 M+×386
Customer happiness99%388 + (?)incompatible units
Combined revenue(not stated)₹100 Cr+ (~USD 12M)INR-denominated
Team members(not stated)1000+
Operating companies(varies, 5–11 named)5 (or 6 — varies by page)self-inconsistent

The fact that the same operator publishes 50,000 users on one corporate page and 7.9 million on another indicates either deliberate inflation on one of the two sites or complete absence of editorial control. The use of Indian Rupees (₹) as the revenue unit on a UAE-Bangkok-Calicut multinational holding company is itself revealing — the financial accounting backbone is in Calicut.

11.4   Caveats & what the operator's stated figures cannot tell us

Blockchain leads

12.1   What we have

  1. Page 53 of the seized notebooks — the operator's own system-architecture flow diagram literally names C2 (Coinbase) as the routing exchange between the algorithm output (`Analysiert(X) → ETH → C1`) and the trader's terminal (Apple, i.e., the Mac PC seized in the same room). [18]
  2. Page 98 of the seized notebooks — six asset boxes (`ETH, SOL, FIL, DOGE, TON, BCH`) drawn as a complete graph (K₆) plus a seventh hub node with intersecting connections to all six. Most-likely interpretation: that hub is the routing exchange (= Coinbase, per page 53) or the operator's central wallet.
  3. Page 52 of the seized notebooks — a 17-coin shortlist with launch-year selection criteria. The operator was actively narrowing a candidate set against a pre-2020-launch + sustained-liquidity filter. This is the asset universe to look across in any on-chain analysis.
  4. Page 66 of the seized notebooks — explicit `Blockchain → {NFT, Smart contracts, WEB3}` axis. The operator was contemplating extension into NFT and smart-contract primitives, beyond the spot-trading model alone.
  5. The dollar amounts in the notebooks — `$1,144,900,000` (3×, the exit total), `$50,000`, `$28,000`, `$1,000` — these are signature-level numbers that, if the operator's accounting was to-the-cent, may be visible as on-chain transaction volumes if operator-controlled wallets are surfaced.

12.2   What the public-facing code does NOT have

A regex scan across every Firecrawl-captured operator domain HTML returned zero hits on any of:

Conclusion: the customer-facing fraud surface (Trade Mirage / D Express / DCARS) does not expose any blockchain integration in its HTML. The deposit funnel runs as customer → call-centre (Calicut WhatsApp +91 9037812288) → manual onboarding → bank transfer or credit-card fee-stack. Any actual on-chain leg is server-side on the seized R730 / Mac PC, or per-investor-generated and exposed only to authenticated members in the (now offline) Trade Mirage member area.

12.3   Coinbase subpoena — consolidated identity list

A Coinbase US-legal-process request should query for accounts associated with any of the following identifiers (any single hit may be sufficient to unlock the full account record). Full list maintained in archive/18_*.md §2.8; abbreviated here:

ClassIdentifiers (representative)
Natural persons Muhammed Dhilshad / Dilshad Muhammed / Dilshad Mohammad / Dilshad Backar / Dennis Poschner / Shafeeq Moossa
Corporate entities Mirage by MAG Investment LLC · Mirage by Mag Car Rental L.L.C. · Mirage by Mag L.L.C. · Matajar E-Commerce LLC · Dabbab Express LLC · Bizfuel LLC · Mirage Holding Company · Mirage Brokerage Co · MIRAGE E-TRADE LLC · Mag Nexa Co., Ltd. · Coders Bunch Software Solutions
Email aliases info@matajargroup.com · dilshadmd@matajargroup.com · dhilshad@matajar.ae · e36verdeck@gmail.com · mohamedkamalrakha@gmail.com · salamk05@gmail.com · info@magnexa.com · partnerships@magnexa.com · onlinerequest@miragebrokerage.net · miragebrokerage2@gmail.com
Phones (verified-account candidates) +971 50 146 6750 · +971 52 622 3887 · +971 58 859 3159 · +971 56 333 5111 · +971 50 272 7891 · +971 50 216 4944 · +971 426 61924 · +66 65 932 1129 · +91 9037812288 · +91 8453 555 000
Aliases / hostnames Bintaryam / bin-taryam (LAN hostname pattern observed on the seized network)

12.4   On-chain matching strategy (signature-number method)

Independent of subpoena access, an on-chain signature-number match may be possible if the operator's accounting was numerically literal:

  1. Targets: ETH, SOL, FIL, DOGE, TON, BCH (and the wider 17-coin universe per notebook page 52). Use Etherscan (ETH), Solscan (SOL), Filfox (FIL), Dogechain (DOGE), Tonviewer (TON), and BCHScan (BCH).
  2. Date range: 2024-01-01 → 2026-04-30 (roughly the active operational window between the rebrand to Dabbab Express and the seizure).
  3. Signature amounts to scan for: exact transfer amounts at the operator's stated dollar-value moments. The notebook records `$50,000`, `$28,000`, `$1,000`, `$1,144,900,000`. Convert each to coin-amount at the on-day spot price and search. A single match is uninformative; three or more in sequence on the same address is a behavioural signature.
  4. Behavioural pattern: per page 53, the architecture is "Analysiert(X) → ETH → C1 → C2 (Coinbase)". So expect ETH inflows from a small set of addresses, followed by routing to known Coinbase deposit addresses. Coinbase deposit addresses are publicly catalogued (e.g., `0x71660c4005ba85c37ccec55d0c4493e66fe775d3`, `0x503828976d22510aad0201ac7ec88293211d23da`, etc.). Inflows from a single small cluster followed by aggregated routing to those Coinbase addresses on dates aligned with the operator's stated activity = a candidate pattern.
  5. Tooling: Chainalysis Reactor / TRM Labs / Arkham Intelligence (paid), or open-source: etherscan-py + web3.py for ETH; solana-py for SOL. Free chain explorers' "address tag" features sometimes flag known scam addresses.
  6. NFT / OpenSea axis (page 66): if the operator extended into NFT, the wallet would have OpenSea / LooksRare / Blur trading history visible on Etherscan-by-token. Search for any wallets transacting with all three of (a) a Coinbase deposit, (b) NFT mints/buys on a OpenSea contract, (c) one of the 17-coin shortlist on a single ETH chain.

12.5   What we did NOT find — wallet addresses in the notebooks or HTML

No specific wallet address strings (no `0x...`, no `bc1...`) are present in either (a) the digitised seized notebooks or (b) any operator-controlled HTML / Firecrawl capture. The operator wrote "Coinbase" by name in the notebooks but did not record specific wallet addresses in the captured pages — those are likely held in a separate physical ledger (yet to be located among the seized materials), in a digital file on the R730 or Mac PC, or memorised as seed-phrase-only.

12.6   Action items — blockchain track

  1. Forensic imaging — both the R730 and the Mac PC. The Mac PC was air-gapped at seizure time per on-site staff; its disk is therefore intact. Browser-stored credentials, MetaMask extension data, OpenSea logged-in sessions, and any seed-phrase / wallet-keystore files would be on these disks.
  2. Coinbase US-legal-process subpoena with the consolidated identity list above.
  3. Search the remaining seized notebooks for any wallet-address-shaped strings (40-char hex, 33-char base58 starting with 1/3, bc1-prefixed Bech32). The catalogue currently covers 81 of 94 photographed pages; some pages may not have been digitised yet.
  4. On-chain signature-number search per §12.4 using the operator's own dollar amounts.
  5. Victim disclosure — the 47-employee LinkedIn list of the Egyptian broker (still requires authenticated session) may include former operations staff who can name internal wallet labels or counterparty addresses.

Businesses timeline — start dates, rebrands, and ceases

Every operator-controlled, operator-adjacent, and brand-collision-excluded entity surfaced to date, plotted on a single time axis (2000–2026) and grouped by corporate cluster. Active bars end with ; ceased bars are cross-hatched with ; bars with unknown start dates have a dotted left edge. The dashed red vertical line marks the ADGM/FSRA fraud alert (2025-12-04).

Regulator-flagged fraud Operator yield-promise / fraud-suspect Operator legitimate-cover Operator legal shell Operator-adjacent sister entity Third-party legitimate (in scope) Excluded (brand-collision, separate entity) Ceased / dead / parked Unknown start date
Cluster / entity
2000 '01 '02 '03 '04 2005 '06 '07 '08 '09 2010 '11 '12 '13 '14 2015 '16 '17 '18 '19 2020 '21 '22 '23 '24 2025 '26
Family origin (Sharjah Gold Souk)
Father's gold retail shop · Sharjah Gold Souk ~2003 →
Mirage Holding (Egypt umbrella, since 2006)
Mirage Holding Company (umbrella) 2006 →
Mirage Brokerage Co · EGX 1148 2006-11-29 →
Mirage International Trading 2006 →
Mirage by MAG family (UAE shells, since 2010)
Mirage by MAG Investment LLC ⚠ ADGM-flagged 2025-12-04 2010 →
Trade Mirage / trademirage.com 2024 → parked 2025-12
Mirage by Mag Car Rental LLC · DCARS 2024 →
Mirage by Mag LLC · D Express licensor 2024 →
MIRAGE E-TRADE LLC (Sharjah) — notebook stamp ? →
Matajar operating brands (e-commerce / cover layer)
CandyBay 2017–2019
Matajar app (B2B) 2019–2020
Matajar by Nesto 2020–2022
Matajar E-Commerce LLC 2020–2024 (renamed)
Wholzale.com (B2B precursor) 2021–2024 ✕ DNS dead
Baqalat Express (D Express precursor) ~2022–2024 ✕ DNS dead
Bizfuel LLC · Vansale 2023 →
Moms & Wives 2023 →
Dabbab Express / D Express ⚠ subscription investment 2024 →
DCARS · dcars.ae ⚠ investment program 2024 →
Cars Now 2024 →
Do-Verify ⚠ misrepresented as KYC 2024 →
Mag Nexa global expansion (2025-, Dubai+Bangkok+Calicut)
Mag Nexa Co., Ltd. (Bangkok holding) 2025 →
magnexa.ai 2025 →
Coders Bunch Software Solutions 2025 →
Metric Motive (Calicut studio — parked site) 2025 → ?
MAG NEXA premium investment ⚠ 2024 →
Sister / operator-adjacent (Sharjah · JAFZA · Calicut)
Wahat Al Nejoum Real Estate (Sharjah) ? →
Power Boom Trading · Powertrade FZE (JAFZA) ? →
Abreco Group / Abreco Freight LLC 2010 →
TAJ ONLINE UAE ? →
Getlead CRM / Getlead Analytics Pvt Ltd (Calicut) 2017 →
German side (Poschner cover · supplier)
e36-verdeck.de (Poschner cover) ~2010 → ✕ DNS dead
Coreto AG (German Dell reseller) long-running →
Excluded — brand-collision (separate entities)
MIRAGE BROKERAGE COMPANY (AZ LLC #02365995) 1991 →
Mirage Development (Abu Dhabi) 2008 →
Mirage Rent A Car LLC (Abu Dhabi luxury) ? →
NEXA Bali (real developer — affinity-fraud lead) ? →
MAGNEXA srl (Italian magnetic-labels — UNRELATED) 2018 →

Reading the timeline: The earliest operator-attached commerce starts at the Sharjah Gold Souk family shop (~2003). The Egyptian "Mirage Holding" cluster activates in 2006 — same year that Matajar self-attests its UAE-side "Mirage International Trading" — strongly suggesting a co-incorporation across the two jurisdictions. The UAE legal shell Mirage by MAG Investment LLC (since 2010) becomes the umbrella under which every later subsidiary is licensed. From 2017 onwards, the operating-brand layer churns roughly every 2–3 years (CandyBay → Matajar → Matajar by Nesto → Matajar Online → Dabbab Express / D Express), with each rebrand preserving the underlying licence. The five-tier yield-promise products are 2023–2024 vintage. The 2025 declaration of Mag Nexa as global holding adds Bangkok and Calicut as licensed jurisdictions — broadening the operation's legal-process surface across three countries.

Crypto-related entities for further research

The seized notebooks explicitly route through Coinbase (notebook page 53: C2 (Coinbase))[18], and the asset universe spans 17 named coins (notebook page 52). The table below catalogues every crypto-adjacent entity that should be researched and (where applicable) issued legal process. Status column: SUBPOENA = US/EU legal process applicable; RESEARCH = OSINT only; EXCLUDED = no operator-link established.

14.1   Exchanges & payment rails

EntityJurisdictionWhy in scopeStatus
CoinbaseUS (Delaware) · listedNotebook p.53 explicitly names C2 (Coinbase) as the routing exchange. Apex US-side subpoena target.SUBPOENA
Tether (USDT issuer)BVI / Hong KongStable-value rail likely used between BTC/ETH inflow and AED/USD off-ramp. Tether complies with US legal-process for OFAC/freeze.SUBPOENA
Circle (USDC issuer)USAlternative stable-value rail; US-domiciled.SUBPOENA
BinanceCayman / globalCommon UAE crypto venue; second routing candidate after Coinbase. Subject to US DoJ DPA from 2023 — discloses to US legal process.SUBPOENA
OKXSeychelles / globalStrong UAE / GCC user base; potential alt-routing.RESEARCH
Kraken (Payward Inc.)USUS-domiciled exchange; subject to US legal process.SUBPOENA
KuCoinSeychellesCommon with Indian / GCC users; weaker disclosure track record.RESEARCH
BybitUAE (DMCC) / SeychellesUAE-licensed via DMCC. Disclosure path within UAE.RESEARCH
BitOasisUAE (Dubai VARA / Bahrain)UAE-licensed crypto exchange (post-VARA 2023). Operator's Dubai presence makes this a plausible local on-ramp.SUBPOENA (UAE)
RainBahrain CB-licensed / UAE VARAUAE / Bahrain-licensed crypto exchange.RESEARCH
CoinWSeychelles, UAE-targetingUAE-targeting marketing.RESEARCH
RazorpayIndia (Bangalore)If the Calicut call-centre routes any rupee/INR settlement, Razorpay is the dominant Indian payment gateway.SUBPOENA (India)
MoonPay / TransakUK / globalFiat-on-ramp aggregators that exchanges integrate with — investor's first crypto purchase often via these.RESEARCH

14.2   The 17-coin universe (notebook p.52) — public chains to scan

CoinChain / tokenPublic explorer for signature-number scan
ETHEthereum (native)etherscan.io
BNBBNB Chain (BEP-20)bscscan.com
SOLSolana (native)solscan.io
XRPXRP Ledgerxrpscan.com
ADACardanocardanoscan.io
DOGEDogecoin (native)dogechain.info
AVAXAvalanche C-Chainsnowtrace.io
TRXTron (TRC-20)tronscan.org
LINKChainlink (ERC-20)etherscan.io
DOTPolkadotpolkadot.subscan.io
MATICPolygonpolygonscan.com
TONThe Open Networktonviewer.com
BCHBitcoin Cashblockchair.com/bitcoin-cash
UNIUniswap (ERC-20)etherscan.io
LTCLitecoinblockchair.com/litecoin
ICPInternet Computerdashboard.internetcomputer.org
ETCEthereum Classicblockscout.com/etc
FIL ✓Filecoin (selected)filfox.info
ATOM ✓Cosmos Hub (selected)mintscan.io
STX ✓Stacks (selected)explorer.hiro.so
HBAR ✓Hedera (selected)hashscan.io
KAS ✓Kaspa (selected)explorer.kaspa.org

14.3   Forensic / on-chain analytics tooling

ToolTypeUse case
Chainalysis ReactorPaidCross-chain transaction tracing; address attribution; KYT
TRM LabsPaidAddress risk scoring, exchange-cluster identification, sanctions screening
Arkham IntelligenceFreemiumPublic attribution graph; entity-cluster visualisation
Etherscan + similarFreePer-chain transaction listing with USD-value annotations
OFAC SDN ListFreeCross-check operator wallets against US sanctions list
OpenSea / Blur / LooksRare APIsFree + authNFT trading history per wallet — page 66 of notebooks marks Blockchain → NFT axis as in-scope

14.4   Wallet-related notebook references (raw)

No wallet-address strings (no 0x..., no bc1...) are present in either the digitised notebooks or any operator-controlled HTML. Any actual addresses live on the seized R730 / Mac PC, in a separate physical ledger not yet captured, or in the operator's Coinbase / Binance / etc. account dashboards which are recoverable only via legal process.

Phone numbers — operator-attached

Ten distinct operator phones have been captured to date — sourced from operator-controlled web pages, Facebook About sections, contact strips on Dilshad's profile page, and WhatsApp wa.me/ redirects behind UAE-displayed phones. The table below records each number, its claimed function, and an action checklist for live testing.

15.1   Immediate WhatsApp-test list (Divergence Systems action)

The numbers below are confirmed-on-WhatsApp candidates that an investigator can dial from a burner WhatsApp account (do not use a personal account) to capture profile photo, "last seen", auto-reply, and any business-account banner. Do not initiate conversation beyond a neutral greeting — preserves chain of custody and avoids operator-side detection that an investigation is active.

#NumberCountry / networkAttributed surfaceWhatsApp action
1+971 50 146 6750UAE / EtisalatDilshad Muhammed personal (FB profile)Screenshot profile photo + status + business-account marker
2+971 52 622 3887UAE / duDilshad UAE alt (dhilshad-profile contact card)Same — profile + status
3+971 58 859 3159UAE / Virgin (5G)Matajar Group main / Bizfuel / D Express / DCARS contact pages all list thisScreenshot — likely shared Matajar account
4+971 56 333 5111UAE / duMatajar WhatsApp main (wa.me/971563335111)WhatsApp Business banner expected — confirm BUSINESS verification
5+971 50 272 7891UAE / EtisalatD Express direct number (matajar bizfuel page)Screenshot
6+971 50 216 4944UAE / EtisalatDCARS direct (wa.me/+971502164944 — investment-program CTA)HIGHEST PRIORITY — the public CTA for the Trade Mirage / DCARS investment funnel. Capture any auto-reply.
7+971 4 266 1924UAE / Etisalat landlineMagnexa.ai office (Mon–Fri 9–6 GST) / Suite 110 Rawdat Al WaslVoice call only (not WhatsApp). Capture answer machine / receptionist.
8+66 65 932 1129Thailand / TrueMove HBangkok Mag Nexa Co., Ltd. office (per dhilshad-profile)WhatsApp screenshot — Thai number for a UAE-marketed group is unusual; profile may reveal Bangkok-side staff
9+91 90 3781 2288India / Kerala (likely Calicut)D Express customer-service WhatsApp behind UAE-displayed phone — directly evidences Calicut call-centreCRITICAL — first contact with the call-centre operator. Truecaller cross-reference needed.
10+91 84 5355 5000India / KeralaGetLead CRM Calicut sales lineTruecaller cross-reference; capture WhatsApp Business banner

15.2   What to capture from each WhatsApp dial

  1. Profile photo — reverse-image-search target; may surface unindexed surfaces
  2. "About" / status text — sometimes contains business hashtags or Telegram handles
  3. "Last seen" visibility (if not blocked) — gives an active-account heartbeat
  4. WhatsApp Business banner — verified-business mark + claimed business name
  5. Auto-reply — many call-centre numbers send a scripted auto-reply with hours / website / referral codes
  6. Catalogue (if Business) — sometimes contains products / pricing + the operator's preferred deposit method

15.3   Truecaller / NumLookup cross-references

For each number above, run Truecaller (Indian-side dominant) and NumLookup / WhitePages / Sync.ME to get the community-tagged caller name. The Indian numbers (+91) are most likely to return Truecaller tags identifying the owning person or department. Save the screenshots into case-archive/captures/whatsapp-truecaller/.

15.4   Subpoena targets per number

NumberCarrierSubpoena target (CDR + subscriber identity)
+971 50/52/56/58/4 — UAEEtisalat / du / Virgin Mobile UAEUAE TDRA-mediated request via Dubai Police / ADGM enforcement chain
+66 65 — BangkokTrueMove HThailand NBTC-mediated request via Royal Thai Police
+91 90 / +91 84 — KeralaReliance Jio / Airtel / Vi (Vodafone Idea)India CERT-In / DoT-mediated request; warrants likely needed for CDR

Criminal organisation chart

Tiered functional chart of the operation. Solid lines indicate confirmed relationships from operator-controlled documents; dotted lines indicate suspected relationships pending confirmation. Roles are inferred from documented evidence — the structure is consistent with a multi-vertical fraud-and-cover-business pyramid.

Tier 1 · Architects (high-confidence)
UAE-side · CEO & Founder
Muhammed Dhilshad
Dilshad Muhammed / Dilshad Mohammad / @dhilshad_backar · UAE Golden Visa · Dubai · Sharjah Gold Souk family origin (since ~2003)
Germany-side · technical author
Dennis Poschner
Offenburg, Germany · author of seized notebooks · named on EUR 481K Coreto invoice · e36-verdeck.de cover trade
Tier 2 · Lieutenants (named, role evidenced)
Co-Founder Matajar E-Commerce
Shafeeq Moossa
Ex-MD Wahat Al Nejoum (Sharjah) · Ex-MD Power Boom Trading (JAFZA) · provides Sharjah + JAFZA cluster connections
Product Manager Matajargroup.com
Ashik Salam
salamk05@gmail.com leaked via dexpress.ai · ex-Baqalat Express, ex-MATAJAR Online
TAJ ONLINE UAE / ex-Matajar
Niffin P Najeeb
Currently TAJ ONLINE UAE; spin-off / successor entity
Tier 3 · Functional pillars
Tech / Engineering
Coders Bunch Software Solutions
BKK + Calicut · web/mobile/AI engineering for D Express, DCars, Do-Verify · Mag Nexa subsidiary
Marketing / Lead-funnel
Bizfuel LLC + Metric Motive
Bizfuel = van-sales SaaS Vansale + digital marketing arm · Metric Motive = Calicut digital growth studio (parked website)
CRM / Boiler-room toolkit
GetLead CRM (Calicut)
3,500+ agents · auto-dialer + IVR + WhatsApp + telecalling · feature stack matches boiler-room operations
Payment / Routing
Coinbase + Egyptian broker
Notebook p.53 names C2 (Coinbase) as routing exchange · Mirage Brokerage Co Egypt (EGX 1148) as licensed-broker layer
Tier 4 · Customer-facing (front-end)
Calicut call-centre
+91 9037812288 (D Express WA)
Indian WhatsApp behind UAE-displayed phone · directly evidences Calicut call-centre on the front line
Calicut sales
+91 8453 555 000 (GetLead CRM)
Calicut sales / demo line
UAE landing pages
Trade Mirage + D Express + DCARS + MAG NEXA + Moms & Wives
Acquisition surfaces. Trade Mirage parked but ads still running.
Meta paid ads
FB / IG ad accounts
28 active Mirage by MAG ads + 30 D Express + 24 Moms & Wives + 17 Trade Mirage. Apr 17 2026 most-recent start.
Tier 5 · Legal-shell layer (jurisdictional cover)
UAE — operating licence
Mirage by MAG Investment LLC
ADGM/FSRA-flagged 2025-12-04 · the umbrella since 2010
UAE — DCARS legal
Mirage by Mag Car Rental L.L.C.
Operates dcars.ae
UAE — D Express licensee
Mirage by Mag L.L.C.
Licensee of dexpress.ai
Sharjah — notebook stamp
MIRAGE E-TRADE LLC
Sharjah, P.O. Box 5045 · stamped on 5+ notebook pages
UAE — e-commerce (rebranded)
Matajar E-Commerce LLC → Dabbab Express LLC
2020-founded, 2024-rebranded
Egypt — under "Mirage Holding"
Mirage Brokerage Co · Mirage Holding Company
EGX member 1148, since 2006
Thailand — global holding
Mag Nexa Co., Ltd. (Bangkok)
Registered Thailand 2025 · DBD lookup pending
Tier 6 · Victims
Trade Mirage withdrawal-trapped
Forex-bot investors
USD 5–25K per fooled investor (industry baseline). Per Zorya review: "57 Investigations Ltd" recovery contacts.
D Express subscription
AED 6,000+ subscribers
5%-monthly yield-promise
DCARS investment
Fleet investors
"Drive Returns, Not Just Cars"
MAG NEXA
USD 25K+ premium investors
3-year lock-in; "Bali resorts"
Moms & Wives
Skill-registration enrolees
Affinity-fraud / MLM-recruitment
Adjacent & potential witnesses (not perpetrators)
German vendor
Coreto AG
Sold the EUR 481K R960 server to Poschner. Subpoena holds the customer file.
Logistics partner
Abreco Group / Abreco Freight LLC
JAFZA-cluster co-located. Matajar's logistics partner since 2022. Holds shipping records.
Brand partner / media
HIT FM (UAE) · Noorin Shareef · Sachet & Parampara
Paid endorsement / event ambassadors. Hold contractual records of operator engagements.
US registered-agent
Anthony Maggio (Forza Capital Funding)
Likely nominee at the AZ "MIRAGE BROKERAGE COMPANY" LLC. Holds fee-for-service records.
Subpoena / disclosure cluster (corporate / platform)
Hosting provider
Hostinger (Lithuania)
IP 82.25.106.182 hosts FIVE operator domains. Holds account-billing identity. Highest-value hosting subpoena.
DNS / website builder
Wix.com Ltd · GoDaddy · Cloudflare
DNS + WHOIS for matajargroup.com (Wix), dexpress.ai/momsandwives.com/magnexa.ai/metricmotive.ai (GoDaddy), do-verify.com (Cloudflare)
Email / Workspace
Microsoft 365 + Google Workspace
6 MS-tokens captured (matajar / trademirage / dexpress / dcars / momsandwives / getleadcrm); google-site-verification=c31Yi8... on momsandwives
App stores
Apple Inc. · Alphabet (Google Play)
D Express iOS id6740457644 (Indian store); D Express Android com.matajar.dexpress; Moms & Wives Android com.matajar.momsandwives
Paid advertising
Meta Platforms Inc.
FB Pixel na5sraqmf6q0rw72rllo4dt2z2xe1m on dexpress.ai. Holds full ad-account billing + targeting + spend.
Crypto exchange
Coinbase
Notebook p.53 explicitly names. Apex US-side subpoena target — see §12.3.

Reading the chart: Tier 1 + Tier 2 are the named human perpetrators (high confidence). Tier 3 is the operational machinery. Tier 4 is the public-facing acquisition surface. Tier 5 is the jurisdictional cover (each shell is registered in a different country to fragment legal-process surface). Tier 6 is the victim base. Below that line: service-provider third parties who hold disclosure-grade records — these are the practical handles by which the operation is unwound.

DNS records — current state of all operator-controlled domains

Live DNS resolution captured 2026-05-05 via Google Public DNS (8.8.8.8). Full per-domain output preserved at case-archive/captures/dns/full_dns.txt. The findings below add several high-value subpoena targets that the operator's HTML alone did not expose.

17.1   Hostinger IP 82.25.106.182 = single-account multi-domain host

FIVE distinct operator domains all resolve to the same Hostinger IP:

DomainA recordMail providerDNS host
trademirage.com82.25.106.182Outlook 365 + Hostinger backup MXHostinger DNS-Parking
matajargroup.com82.25.106.182Outlook 365Wix DNS
dexpress.ai82.25.106.182Outlook 365 + mlrcloud.com relayGoDaddy
dcars.ae82.25.106.182Outlook 365Hostinger DNS-Parking
momsandwives.com51.112.131.103 *Outlook 365 + mlrcloud.com relayGoDaddy

* momsandwives.com resolves to a different IP (51.112.131.103) but uses the same Outlook 365 tenancy + GoDaddy DNS pattern — likely a sister Hostinger account or a separate VPS.

Subpoena target: Hostinger International Limited (Lithuania, EU) — disclosure of the customer account behind 82.25.106.182 would unlock the billing identity, payment method, and full list of domains hosted on the account. This is the single highest-value hosting subpoena in the case.

17.2   Microsoft 365 tenant verification tokens

Each Outlook-hosted operator domain publishes a Microsoft tenant verification (MS=ms*) TXT record. Microsoft holds the tenant identity for each token — subpoena unlocks the Microsoft 365 corporate-tenant owner.

DomainMicrosoft 365 tenant token
matajargroup.comMS=ms22359510
trademirage.comMS=ms94471669
dexpress.aiMS=ms31891273
dcars.aeMS=ms44316426
momsandwives.comMS=ms20998229
getleadcrm.comMS=ms42540145

17.3   Other named verification / pixel tokens

DomainToken / recordDisclosure target
dexpress.aifacebook-domain-verification=na5sraqmf6q0rw72rllo4dt2z2xe1mMeta Platforms — Business Manager account holder
momsandwives.comgoogle-site-verification=c31Yi8C5ZZHkGKEnSAjPjI6KaHXlSp_ukYVJzvc9K1QGoogle — Workspace / Search Console account holder
matajargroup.com1c92ebbe2556e7e01da070e9fd4c64c8 (TXT — purpose unknown)Likely a Stripe / Razorpay / similar payment-gateway verification — needs identification

17.4   trademirage.com has unusual German-format date TXT records

Two TXT records on trademirage.com read literally as date strings in German DD.MM.YYYY format:

These look like operator-side annotations — possibly deployment markers, DNS-rotation timestamps, or some custom verification scheme. Their German DD.MM format is stylistic evidence of a German-side editor (consistent with Dennis Poschner). They are not part of any standard DNS-record specification.

17.5   Egyptian-side hosting cluster

DomainA recordHosted by
etrade-miragebrokerage.net196.219.50.170LinkDataCenter (Egypt) / Link.net NS
miragebrokerage.net192.254.132.232TE Data (Telecom Egypt) NS
miragebrokerage.org192.254.132.232TE Data (same as .net)
miragebrokerage.eg41.33.114.75Self-hosted; SPF includes spf.mail.miragebrokerage.eg

The Egyptian-side cluster is hosted entirely on Egyptian ISP infrastructure (LinkDataCenter + TE Data) and runs its own Egyptian-domiciled SPF mail server (spf.mail.miragebrokerage.eg). Disclosure path is the Egyptian National Telecom Regulatory Authority (NTRA) and FRA.

17.6   Web3 / on-chain DNS records

A targeted scan was run for any web3-style DNS records — dnslink= (IPFS pointers), _eth./_btc. CAA-style wallet-pointer records, ENS reverse records, Unstoppable Domains hooks, and CryptoDomains TXT strings. No matches were found across any of the 22 operator-controlled domains. The operator's DNS is web2-only.

17.7   Reverse-WHOIS strategy (operator-attached email → other domains)

The next research step on this track is reverse-WHOIS: feed each operator-attached email (consolidated list in §12.3) into ViewDNS / DomainTools / WhoXY reverse-WHOIS to enumerate every other domain the same email has registered. Likely candidates per email:

A reverse-WHOIS hit on any operator email may surface previously-unknown sister scam domains registered by the same parties — the operator pattern of churning brand surfaces every 2–3 years (CandyBay → Matajar → Dabbab Express) means there are likely older registrations not yet in our domain inventory.

App Store, Play Store & developer accounts

The operator publishes 5 mobile apps (3 iOS + 2 Android) under 2 developer accounts. The Apple side is a personal-name account ("Muhammed Dilshad" ID 1786185813) — meaning Apple's payment-method-on-file points directly at the natural person, not a corporate entity. The Google Play side is a business-name account ("Moms and Wives") under which both D Express and Moms & Wives Android apps are published.

The dexpress.ai homepage carries verbatim Lorem Ipsum placeholder text ("It is a long established fact that a reader will be distracted by the readable content of a page when looking at its layout. The point of using Lorem Ipsum…"), duplicated on Matajar Group's own /d-express/ subsidiary page. An operator running an AED 6,000-entry investment platform with Lorem Ipsum in production is a strong signal of outsourced (likely Calicut Coders Bunch) web development with no operator-side copy review — and reinforces the picture that the actual sales funnel is the WhatsApp call-centre, not the website.

18.1   Mobile app inventory

AppPlatformBundle / IDDeveloper (account name)Notable
D Express iOS (Indian App Store) id6740457644 Muhammed Dilshad (Apple ID 1786185813) 82.8 MB · 16 versions back to v1.1.0 (29 Apr 2025) · No ratings yet · Privacy policy hosted on AWS S3 dabbab-bucket (Bahrain me-central-1)
Moms & Wives iOS (Indian App Store) id6740058185 Muhammed Dilshad (Apple ID 1786185813) 183 MB · 97 ratings · 3.6 stars · Developer responses signed info@momsandwives.com (NEW email) · Multiple OTP / "cannot update" complaints
DCars iOS (Indian App Store) id6751324576 Muhammed Dilshad (Apple ID 1786185813) 69.5 MB · v1.2.0 (30 Oct 2025) · No ratings yet · Privacy policy at dcars.ae
D Express Android (Google Play) com.matajar.dexpress Moms and Wives (Play developer) 1K+ downloads · Updated 24 Oct 2025 · "No data shared with third parties" (developer-declared)
Moms & Wives Android (Google Play) com.matajar.momsandwives Moms and Wives (Play developer) 100K+ downloads · Teen content rating · Multiple screenshots

18.2   New AWS infrastructure discovered: dabbab-bucket

The D Express iOS privacy-policy URL revealed an operator-controlled AWS S3 bucket:

https://dabbab-bucket.s3.me-central-1.amazonaws.com/TermsAndConditions/PRIVACY-POLICY-Dexpress.docx

Region: me-central-1 = AWS Bahrain. The bucket-root request returns "Access Denied" (listing restricted, normal AWS behaviour) but confirms the bucket exists. This is a new infrastructure subpoena target: AWS will disclose the account holder, billing card, region, and bucket-content listing under US legal process. Other operator assets likely live in the same bucket (Terms / Privacy / Cookie policies / app-asset images / promotional video files).

18.3   Discrepancy: dev-account name vs. corporate-marketing name

The mismatch matters because Apple's Section 230-style limited-liability protections do not transfer when the developer is a natural person. Any dispute / fraud complaint against the iOS apps targets Muhammed Dilshad personally — not Matajar Group, not Mirage by MAG, not Mag Nexa. This is operationally relevant for victim recovery and for jurisdictional purposes.

18.4   Subpoena targets — store-side

Domain registrations & WHOIS

Most operator domains are privacy-redacted in WHOIS (post-GDPR, this is standard for .com / .ai / .net), so the registrant identity is hidden in the public record and only recoverable via registrar-side legal-process disclosure. The registrar-by-domain breakdown below establishes which legal process applies to which domain.

19.1   Registrars and DNS hosts (consolidated)

DomainRegistrarDNS hostWeb/A IPMail provider
matajargroup.com Wix.com Ltd (US/IL) Wix DNS 82.25.106.182 (Hostinger LT) Microsoft 365
trademirage.com GoDaddy (US) Hostinger DNS-Parking 82.25.106.182 (Hostinger LT) Microsoft 365 + Hostinger backup
dexpress.ai GoDaddy (US) GoDaddy 82.25.106.182 (Hostinger LT) Microsoft 365 + mlrcloud.com
dcars.ae (Hostinger DNS — UAE TLD registrar TBC) Hostinger DNS-Parking 82.25.106.182 (Hostinger LT) Microsoft 365
momsandwives.com GoDaddy (US) GoDaddy 51.112.131.103 Microsoft 365 + mlrcloud.com
magnexa.ai GoDaddy (US) GoDaddy 142.93.223.193 (DigitalOcean) (none captured)
do-verify.com BigRock Solutions Ltd (Indian registrar) Cloudflare (Cloudflare-fronted) (none captured)
metricmotive.ai GoDaddy (per NS pattern) GoDaddy + Cloudflare (parked)
etrade-miragebrokerage.net eNom, LLC (US — Tucows subsidiary) Link.net (Egypt) 196.219.50.170 (LinkDataCenter EG) LinkDataCenter EG
miragebrokerage.net / .org (eNom likely — to confirm) TE Data (Telecom Egypt) 192.254.132.232 (shared) self-hosted
matajar.ae AEserver AEserver 212.95.51.38 (AEserver UAE) self-hosted + MailChannels
getleadcrm.com (GoDaddy or similar) Cloudflare (Cloudflare-fronted) Microsoft 365
e36-verdeck.de (German DENIC registrar — TBC) (DNS dead) (DNS dead)
wholzale.com (GoDaddy likely — TBC) (DNS dead) (DNS dead)
baqalat.express (.express TLD via Donuts / Identity Digital) (DNS dead) (DNS dead)

19.2   Subpoena prioritisation

  1. GoDaddy.com LLC (US) — registers most of the operator's .com and .ai domains: trademirage, dexpress.ai, momsandwives, magnexa.ai. Single subpoena under US legal process unlocks 4+ registrant identities.
  2. Hostinger International (Lithuania, EU) — hosts the actual content for 4+ domains on shared IP 82.25.106.182. Single subpoena unlocks the hosting account-billing identity.
  3. Microsoft Corporation — operates the M365 mailboxes for 6 operator domains (per archive 19). Single subpoena via the M365 tenant tokens unlocks all corporate mailboxes including dilshadmd@matajargroup.com, info@matajargroup.com, etc.
  4. Wix.com Ltd — registers matajargroup.com and hosts its DNS. Wix is US-EU hybrid; subpoena unlocks DNS-edit history (incl. the German-format TXT records on trademirage.com if Wix has a transit role).
  5. BigRock Solutions Ltd (India) — registers do-verify.com. Indian legal process; relatively responsive to ICANN procedures.
  6. eNom, LLC (US — Tucows) — registers etrade-miragebrokerage.net (Egyptian arm). US legal process.
  7. Cloudflare, Inc. (US) — DNS host for do-verify.com + getleadcrm.com. US legal process; will reveal origin IP.
  8. AEserver (UAE) — local UAE registrar for matajar.ae. UAE legal process via TDRA.

Google Business profiles & local listings

20.1   "TRADE MIRAGE INVESTMENT" Google Business Profile (major finding)

Listing nameTRADE MIRAGE INVESTMENT
Rating4.6 stars (with real customer reviews — number not yet captured)
Category (significant)Business development service — NOT "investment firm" / "trading platform" / "broker", which would draw regulator attention
AddressMatajar E Commerce Back office, 25 34 St — Sheikh Zayed Collector Rd — Port Saeed — Dubai — United Arab Emirates
Plus Code57V6+JF Dubai
HoursMon–Fri 9 AM – 5 PM (closed weekends)
Phone+971 4 266 5518 (NEW operator landline — distinct from the +971 4 266 1924 Magnexa office line)
Websitetrademirage.com

The category "Business development service" is operationally telling: it is the most common UAE Google Business Profile category for entities that don't want their Maps listing to surface in regulator / consumer-protection searches for "trading platform" or "investment". The 4.6-star rating implies real reviewers — these reviewer profiles are victim-witness candidates.

20.2   "Matajar Group" Google Business Profile

Listing nameMatajar Group
Rating4.6 stars
CategoryCorporate office
Status (notable)"Temporarily closed" — Google Maps marker
AddressSheikh Zayed Collector Rd — Al Wasl — Dubai (Plus Code 57V6+JF — same plus code as Trade Mirage Investment, i.e. same building / same area)
Phone+971 56 333 5111 (the Matajar WhatsApp)
Websitematajargroup.com

Both listings share Plus Code 57V6+JF Dubai — they are in the same building area on Sheikh Zayed Collector Rd. The "Temporarily closed" annotation on Matajar Group is worth tracking; it may be Google-applied (algorithmic closure based on absent verifications) or self-applied (operator marked it closed).

20.3   2GIS Dubai listing

Independently of Google, 2GIS (UAE business directory) lists Matajar Group at "Rawdat Al Wasl Building, 206, Sheikh Zayed Road, 1st Floor, Office 1103, Al Wasl Jumeirah, Dubai" with phone +971 4 337 1027 (NEW landline). Listing ID 70000001100738456. The 2GIS address differs from the Google Business address — they may be the same building unit numbered differently, or a separate office in the same area.

20.4   Other operator brands' Google listings (pending capture)

20.5   Phone-number inventory revised

Adding the two newly discovered landlines, the operator's phone footprint is now twelve distinct numbers:

#NumberTypeAttributionSource
1+971 50 146 6750UAE mobile (Etisalat)Dilshad personalFacebook About
2+971 52 622 3887UAE mobile (du)Dilshad UAE altdhilshad-profile contact
3+971 58 859 3159UAE mobile (Virgin)Matajar mainmatajargroup.com / multiple subsidiary pages
4+971 56 333 5111UAE mobile (du)Matajar WhatsAppcontact-us page + Google Maps
5+971 50 272 7891UAE mobile (Etisalat)D ExpressD Express direct
6+971 50 216 4944UAE mobile (Etisalat)DCARS / investment funneldcars.ae/investments wa.me
7+971 4 266 1924UAE landlineMagnexa.ai officemagnexa.ai/contact
8+971 4 266 5518UAE landline (NEW)TRADE MIRAGE INVESTMENT GMBGoogle Maps profile
9+971 4 337 1027UAE landline (NEW)Matajar Group 2GIS2GIS Dubai listing
10+66 65 932 1129Thailand mobileBangkok Mag Nexadhilshad-profile
11+91 90 3781 2288India mobile (Kerala)D Express WhatsApp / Calicut call-centreD Express contact wa.me
12+91 84 5355 5000India mobile (Kerala)GetLead CRM Calicut salesgetleadcrm.com

The three UAE landlines (+971 4 266 1924, +971 4 266 5518, +971 4 337 1027) all share the prefix +971 4 = Dubai area code. The two +971 4 266 numbers are sequential within Etisalat's Dubai block — likely two PBX extensions on the same physical office line. The 2GIS landline +971 4 337 1027 is on a different exchange and may correspond to a different tenant block or earlier office.

20.6   Email-address inventory revised

Adding info@momsandwives.com (newly surfaced from Apple's Moms & Wives developer-response thread), the operator's email footprint now totals eleven distinct addresses:

  1. info@matajargroup.com — general matajargroup
  2. dilshadmd@matajargroup.com — Dilshad corporate
  3. dhilshad@matajar.ae — Dilshad personal (matajar.ae MX active)
  4. info@magnexa.com — claimed but mislabelled (magnexa.com is third-party Italian)
  5. partnerships@magnexa.com — same
  6. info@momsandwives.com — NEW (Apple developer-response signature)
  7. salamk05@gmail.com — Ashik Salam personal Gmail (leak)
  8. e36verdeck@gmail.com — Poschner cover
  9. mohamedkamalrakha@gmail.com — Egyptian admin
  10. miragebrokerage2@gmail.com — Egyptian ops
  11. onlinerequest@miragebrokerage.net — Egyptian corporate

Social-media intel: shared phones, hidden contacts & category-dodge pattern

21.1   The "category-dodge" pattern

Three operator brands all categorise themselves under non-financial social-platform categories — a deliberate pattern to avoid surfacing in regulator / consumer-protection search.

BrandPlatformSelf-declared categoryWhat it actually does
Matajar GroupFacebook PageFood & beverageMulti-vertical holding inc. forex/commodity trading, "investment platforms"
Moms & WivesFacebook PageSocial serviceMLM-recruitment "skill registration" platform with fee structure
TRADE MIRAGE INVESTMENTGoogle Business ProfileBusiness development serviceForex / 6-coin algorithmic trading bot — ADGM-flagged fraud
Dilshad personalFacebook profileEntrepreneur(matches public corporate role)

Each non-financial category is a deliberate choice. Search a regulator's Google for "Dubai forex trading platform" and Trade Mirage Investment's "Business development service" GMB profile won't surface; search "Dubai social services" and you'll see Moms & Wives. The pattern is consistent with a category-laundering posture — present the same business under whichever non-financial category each platform makes available.

21.2   Shared phone — D Express AND Moms & Wives are the same operator-side line

The phone +971 50 272 7891 appears as the customer-service contact on both the D Express website AND the Moms & Wives Facebook Page. One operator number serves two distinct branded customer-service surfaces — confirmed via the user-supplied Facebook screenshot dated 2026-05-05. This is a strong indication that the front-line call-centre answers calls under whichever brand the caller asks for, rather than running separate teams per brand.

21.3   "+ N" hidden contacts on Facebook Pages

The Moms & Wives Facebook Page Contact info section displays moms_nd_wives + 3 next to the email/IG line — Facebook's "+ N" indicator means 3 additional contact handles are stored on the Page but only revealed when a visitor expands the field. Each + N field on every operator FB Page should be expanded with a screenshot. Per the user's screenshot, those fields likely include:

21.4   New personal Gmail discovered: info.matajargroup@gmail.com

Matajar Group's Facebook About page lists info.matajargroup@gmail.com as the email contact — distinct from the corporate info@matajargroup.com. This is the "humble-beginnings Gmail" variant — the operator-side personal Gmail used before the corporate Microsoft 365 tenancy was provisioned. Pattern: {prefix}.{brand}@gmail.com. Worth searching against HIBP / Dehashed / IntelX directly.

Updated email-address inventory now totals 12 distinct addresses. The info.matajargroup@gmail.com entry replaces the previous "Item 6 — info@momsandwives.com" slot and adds: info.matajargroup@gmail.com as a new candidate for reverse-WHOIS enumeration of the operator's domain registrations.

21.5   Action list — manual Facebook screenshot capture

Divergence Systems should walk through each operator-controlled Facebook Page in the Facebook mobile app from a burner account and screenshot the following sections per Page:

  1. About → Contact and basic info — expand every "+ N" field; screenshot the full revealed list
  2. About → Page transparency — captures: Page created date, Page name history (rebrands!), Country of admins, Confirmed Page owner, Ad library link
  3. Reviews — full list of reviewer profiles + review text + dates (these reviewer profiles are victim-witness candidates for Trade Mirage Investment in particular)
  4. Posts — first post date + most-recent post date (gives Page activity span)
  5. Photos — any Photos section may contain operator-uploaded promotional images that surface additional brand surfaces (logos, posters, event photos)
  6. Featured / linked Pages — reveals which other operator brands are connected to this Page in Facebook's internal graph

Pages to walk:

21.6   Why Page Transparency matters for this case

Facebook's Page Transparency section is one of the few pieces of Page metadata that cannot be retroactively rewritten by the Page admin — it's Meta-controlled. Specifically:

Five regulator-grade self-incrimination exhibits on matajargroup.com

Across 2026-05-05 (141 days post-ADGM/FSRA fraud alert), the operator's parent corporate site matajargroup.com publishes five stand-alone exhibits that independently establish unlicensed financial-services solicitation, knowing facilitation of a regulator-flagged brand, multi-jurisdictional unlicensed investment claims, Ponzi grammar, and asset-class-incompatibility commingling fraud. Each exhibit below is verbatim from the live site2122.

22.1   Exhibit A — Mission-paragraph self-attestation

Source URL: matajargroup.com (homepage About-Us, also Investment + History pages)

"At Matajar Group, our mission is to lead with innovation, integrity, and customer focus across every sector we serve. From building trusted investment platforms in forex and commodities, to delivering seamless eCommerce experiences and redefining automotive access through rental and lease solutions..."

The phrase "trusted investment platforms in forex and commodities" is a public-facing self-attestation that Matajar Group operates forex/commodity trading platforms. Cross-search of SCA + DFSA + FSRA registers confirms no UAE financial-services license for Matajar Group, Mirage by MAG, or Trade Mirage. The mission paragraph is direct evidence of unlicensed financial-services solicitation under UAE Federal Law (SCA Decision No (1/R) of 2019).

22.2   Exhibit B — Cross-sell of regulator-flagged brand from parent corporate site

Source URL: matajargroup.com/services — Golden Membership Card section

"The Golden Membership Card is Matajar Group's premium loyalty and subscription program... Whether you're shopping on Dexpress, renting a car through Dcars, managing van sales with BizFuel, or investing through Mirage..."

The parent corporate site explicitly cross-sells "investing through Mirage" as a vertical of a loyalty program — post-ADGM-alert and post-FSRA-alert. This places the regulator-flagged Mirage brand at the apex of a Matajar Group customer-journey funnel. Even if Mirage by MAG Investment LLC is argued as a separate legal entity, the parent-company cross-sell creates direct knowing facilitation of the unlicensed Mirage investment offering.

22.3   Exhibit C — MAG NEXA "Where Wellness Meets Wealth" pitch (verbatim)

Source URL: matajargroup.com/mag-nexa — full pitch section

"MAG NEXA presents a compelling investment opportunity for forward-thinking high-net-worth individuals... With a minimum entry of $25,000 USD, investors gain access to a structured monthly return of 4% equivalent to 48% per annum paid directly from live operating cash flow across three revenue-generating verticals."

"Unlike speculative investments, MAG NEXA is anchored by real, appreciating assets — from premium retreat operations and curated holiday homes to a flagship luxury resort development in Thailand. Your capital doesn't sit idle; it powers a self-sustaining ecosystem that grows with every client acquired, every stay booked, and every property added to the portfolio."

"Investors also enjoy exclusive lifestyle privileges including complimentary and discounted retreat access, priority booking across the full Nexa network, and invitations to private investor summits. With a clear 36-month buildout roadmap and multiple exit pathways including equity conversion, resort asset sale, and global franchise scaling..."

This paragraph is textbook unauthorised investment-services solicitation across multiple jurisdictions:

Three new sub-brands surfaced from this pitch: ZEN Escape retreats, Nexa Sanctuary resort, Nexa Stay holiday homes.

22.4   Exhibit D — Ponzi grammar (returns described as a function of new client acquisition)

Within Exhibit C, one phrase warrants standalone treatment as a regulator exhibit:

"Your capital doesn't sit idle; it powers a self-sustaining ecosystem that grows with every client acquired, every stay booked, and every property added to the portfolio."

The phrase "grows with every client acquired" describes returns as a function of new client acquisition rather than asset performance. This is the textbook Ponzi grammar — investor returns are funded by new investor inflows, not by the underlying claimed asset's cash generation. Under SEC v. Howey Co. (1946) and equivalent UAE / Egyptian / Indian securities-fraud jurisprudence, this language alone is sufficient to characterise the offering as an unregistered securities-fraud scheme.

22.5   Exhibit E — Asset-class incompatibility (commingling-grade fraud)

Source URL: matajargroup.com — Investment page (logistics + delivery van + property stacked at AED 100,000)

These are three completely incompatible asset classes presented as the same investment at the same minimum entry. A regulator's read: investor money is pooled into an undefined product and labelled whichever asset class will close the prospect. Commingling-grade fraud — investors don't know what they're actually buying. Under UAE Federal Decree-Law No. (20) of 2018 (AML/CFT Law), pooling investor funds under misrepresented asset classes triggers AML reporting requirements that have not been met.

22.6   Nine simultaneously-published investment products

#ProductStated yield / entryAsset class claimed
1D Express subscription5%/month, AED 6,000Grocery loyalty (cash withdrawal)
2Logistics Investment4-6%/month, AED 100,000E-commerce logistics
3"Invest in Delivery Van"(same AED 100K block)Specific physical vehicle stake
4"Invest in Property with Matajar"UPTO 35%, AED 100KReal estate
5DCARS fleetMonthly OR quarterly profit-shareVehicle fleet
6MAG NEXA "Wellness Meets Wealth"4%/month = 48% annual, $25K USDWellness retreats + Thailand resort
7"Investing through Mirage" cross-sell(unstated)Mirage forex/crypto
8Trade Mirage forex bot12%/monthAlgorithmic crypto
9"Boost Your Online Sales" service(service fee)E-commerce SaaS

No legitimate operator simultaneously publishes nine yield-promise products spanning seven incompatible asset classes. The combinatorial pattern itself is operational signature.

The operator's brand-shadow signature — one-letter / namespace shadowing of legitimate entities

The operator's signature tactic is one-letter / namespace shadowing of legitimate UAE/regional entities. Four instances are now documented21.

#Operator brandReal legitimate entity being shadowedDiscovery source
1 Matajar (with -ar) Sharjah Holdings "Matajer" (with -er) — 2012 Sharjah-government-adjacent retail brand Behance, Feb 4, 2012: "Matajer is the new project for Sharjah Holdings to offer a close-proximity retail destination"
2 Mirage by MAG Investment LLC (UAE, since 2010) Mirage Holding Company (Egyptian umbrella, since 2006) + Egyptian Mirage Brokerage Co (EGX member 1148) Twitter @BrokerageMirage bio + matajargroup About-Us "Operating License Mirage by MAG Investment LLC since 2010"
3 MAG NEXA Real NEXA Bali developer (nexauniverse.com, 15 completed Bali projects, "Alexander" founder) MAG NEXA pitch lists "Bali" as one of its claimed geographies
4 "Bintaryam" (operator alias / LAN hostname) Taryam Omran Investments (Sharjah, Suites 1401/1402 Al Hind Tower, toh.ae) Operator alias = Arabic bin Taryam (= "son of Taryam") shadowing a real Sharjah investment-house surname

Plus a fifth potential instance: AZ MIRAGE BROKERAGE COMPANY (Arizona LLC file 02365995, since 1991) is at the same Tempe AZ address that the Egyptian Mirage Brokerage Co self-attests as their US presence — a transatlantic brand-shadow.

The four-plus instances are not coincidence. Brand-shadowing of a legitimate entity within the same regulatory market is an operational pattern: investor due-diligence searches return real results that the investor mis-attributes to the operator's brand. The operator builds credibility off the borrowed reputation without the licensing or asset base that actually backs the legitimate entity.

Mobile-app inventory + Apple/Google developer-account natural-person liability

24.1   Apple App Store (Indian regional registration)

Developer nameMuhammed Dilshad (personal-name account)
Developer ID1786185813
Apple regional registrationIndian App Store (apps surface on apps.apple.com/in/...)

3 iOS apps under this developer account:

AppiTunes IDSizeVersionsRatings
D Expressid674045764482.8 MB16 versions back to 29 Apr 2025No ratings yet
Moms & Wivesid6740058185183 MB97 ratings / 3.6 stars with multiple OTP/login bug complaints; developer responses signed info@momsandwives.com
DCarsid675132457669.5 MBv1.2.0 30 Oct 2025No ratings

24.2   Google Play (business-name developer)

Developer name"Moms and Wives" (business-name account)

24.3   AWS S3 (Bahrain region)

Bucketdabbab-bucket.s3.me-central-1.amazonaws.com
Regionme-central-1 (Bahrain)
Hosted contentD Express iOS privacy policy
Bucket-rootReturns Access Denied (listing restricted)
Subpoena targetAWS Inc. for account holder + bucket contents

24.4   Why the developer-account name asymmetry matters

Apple's payment-method-on-file points directly at Muhammed Dilshad personally, not Matajar Group / Mirage by MAG. Any victim-side Apple-channel dispute or fraud complaint targets Dilshad as the personal natural-person developer. This is a direct natural-person liability handle distinct from the corporate-shell layer — and a clean subpoena target via Apple Inc. (Cupertino, CA) for billing identity, payment methods, refund history, and login IPs.

Updated 14-phone consolidated inventory + WhatsApp selective-scrub pattern

25.1   The 14-phone inventory

#NumberTypeAttributionWhatsApp status
1+971 50 146 6750Mobile (Etisalat)Dilshad personal (FB profile)(untested)
2+971 52 622 3887Mobile (du)Dilshad UAE alt(untested)
3+971 58 859 3159Mobile (Virgin)Matajar main / Dilshad-tierON WhatsApp — investigator-confirmed reaches "someone key"
4+971 56 333 5111Mobile (du)Matajar WhatsApp mainON WhatsApp (publicly listed as wa.me/971563335111)
5+971 50 272 7891Mobile (Etisalat)D Express + Moms & Wives shared customer-serviceON WhatsApp
6+971 50 216 4944Mobile (Etisalat)DCARS investment funnelON WhatsApp
7+971 4 266 1924LandlineMagnexa.ai office(landline)
8+971 4 266 5518LandlineTrade Mirage Investment GMB(landline)
9+971 4 337 1027LandlineMatajar Group 2GIS(landline)
10+971 54 997 8780Mobile (du)Trade Mirage HR posterNOT on WhatsApp — investigator-confirmed deactivated
11+66 65 932 1129Bangkok mobileMag Nexa Bangkok office(untested)
12+91 90 3781 2288India mobile (Kerala)D Express call-centre WhatsApp behind UAE-displayed phoneON WhatsApp
13+91 84 5355 5000India mobile (Kerala)GetLead CRM CalicutON WhatsApp
14(malformed) +97156335111Listed on websiteEither typo or non-routing

25.2   The selective-scrub pattern

The 2026-05-05 investigator-led WhatsApp test sweep revealed a selective-scrub pattern — the operator has wiped WhatsApp accounts on regulator-flagged-brand numbers while keeping live the ones that funnel to leadership:

Trade Mirage HR is voice/SMS-only by design. When a regulator dials the number printed on the Trade Mirage hiring poster, they hit "not on WhatsApp" and the trail looks dead. Meanwhile the actual leadership funnel routes through +971 58 859 3159 which doesn't carry the Mirage brand string and isn't on the regulator's radar. This is operational counter-intelligence behaviour consistent with someone who has already responded to a regulator alert by silently triaging which channels to keep open.

Updated 12-email consolidated inventory

Adding three NEW emails surfaced from this batch (humble-beginnings Gmails + Trade Mirage HR Gmail + Play Store-leaked address):

#EmailTierSource
1info@matajargroup.comCorporate generalmatajargroup.com contact
2dilshadmd@matajargroup.comDilshad corporatematajargroup contact (MD = Muhammed Dhilshad initials)
3dhilshad@matajar.aeDilshad personal (matajar.ae MX active despite domain parked)matajar.ae DNS
4info.matajargroup@gmail.comNEW — humble-beginnings personal GmailMatajargroup FB Contact info
5hr.trademirage@gmail.comNEW — Trade Mirage HR GmailTrade Mirage hiring poster
6info@momsandwives.comMoms & Wives corporateApple App Store developer responses
7es.matajar@gmail.comNEW — purpose unknownPlay Store Moms&Wives + D Express captures
8salamk05@gmail.comAshik Salam personal (Product Manager) — leaked via dexpress.ai contact-page malformed hrefdexpress.ai HTML
9e36verdeck@gmail.comDennis Poschner cover businesse36-verdeck.de
10mohamedkamalrakha@gmail.comEgyptian Mirage Brokerage adminEGX member registry
11miragebrokerage2@gmail.comEgyptian operationsEgyptian Mirage Brokerage social
12onlinerequest@miragebrokerage.netEgyptian corporatemiragebrokerage.net

Three of the twelve are Gmail addresses (humble-beginnings pattern): the operator's pre-corporate mail used before the Microsoft 365 tenant was provisioned. These are the highest-yield targets for HIBP / Dehashed / IntelX (paid-tier) breach-database lookups — a single breach hit ties the email to a real device, a real IP, a real registration trail across years of the operator's history.

Operational unsophistication signals — the operator's digital infrastructure is template-grade

Triangulating across captured material, the operator runs a fraud psychology that is sophisticated at brand churn and affinity marketing, but unsophisticated at digital infrastructure. Eight signals collected:

  1. Lorem Ipsum placeholder text on three production operator pages — dexpress.ai homepage AND matajargroup.com/d-express/ AND console.do-verify.com "coming soon"17. Lorem Ipsum on a live commerce surface signals neither QA nor pre-launch review.
  2. Zero analytics pixels on operator HTML despite 100+ active Meta ads — no Meta Pixel, no GTM, no GA4, no TikTok Pixel, no Hotjar, no Mixpanel, no Segment, no Clarity, no reCAPTCHA, no Stripe / Razorpay client-side keys19. The operator has paid Meta substantially for paid ads but cannot measure conversion.
  3. WordPress + Elementor + ElementsKit Lite + Metform template-grade build — no SEO plugins, no custom theme, no enterprise plugin stack. The operator's flagship corporate domain is a $47/year template assembly.
  4. Five contradictory tech-arm labels for the same function: Coders Bunch (Mag Nexa BKK+Calicut), TechnoTech (matajargroup services snippet), MTECHO.TECH (matajargroup live page), Metric Motive (Calicut, parked website), aeth Analytica (third-party contractor publicly crediting Nesto Group, not Matajar — direct contradiction of operator narrative).
  5. Three inconsistent active-user counts: matajargroup.com claims 50,000 users; magnexa.ai claims 7.9M users; magnexa.ai/subsidiaries claims 7.9M+ but earlier said 5 ops vs 6 ops within own pages.
  6. Nine simultaneously-published yield figures across operator domains — none achievable in their stated asset class.
  7. Brand-shadow pattern + ENS-ignorance: zero operator brand strings registered on ENS or Unstoppable Domains22. Operator runs in 2024-2026 with a pre-2018 web2-only mental model.
  8. Mobile +97156335111 published with 8 digits (invalid UAE format) on contact-us page — typo on the operator's own corporate website, never QA'd.

The operator did not outsmart anyone. They out-volumed scrutiny by churning brands every 2-3 years and spreading exposure across enough jurisdictions that no single regulator sees the whole picture. The infrastructure unsophistication actually aids the case: it confirms the absence of any underlying technical operation matching the "algorithmic trading bot" / "AI investment platform" claims.

First photographic evidence of the operator's face — 24 April 2025 birthday post

The 24 April 2025 Matajargroup.com Facebook birthday post titled "Happy Birthday Visionary CEO MUHAMMAD DHILSHAD" provides the first attached-to-his-name photograph of the operator. Image shows beard, brown jacket, tan shirt, dark hair21.

Two named likers of the post — Jasna Shabeer + Sofiya Sofiya — are inner-circle candidates worth running through LinkedIn / FB / IG for relationship to operator (likely relatives or close associates).

@Momsandwives YouTube channel mirrored via yt-dlp — 206 videos / 305 descriptions / 63 EN VTT

Channelyoutube.com/@Momsandwives
Subscribers11,000 (per user-supplied screenshot)
Videos (channel-listed)108
Videos captured by yt-dlp206 (including Shorts playlist)
Total descriptions captured305
English VTT subtitles captured63
English-orig VTT captured59
Malayalam VTT captured4

29.1   Confirmed speakers / on-screen guests

29.2   Significant titles surfaced

29.3   MEGA APP LAUNCH playlist — 54-video speaker-inventory mining target

The "MEGA APP LAUNCH" playlist on the channel contains 54 videos documenting the Moms & Wives app launch event. Likely speaker / panel / demo recordings — each title reveals additional named operator-affiliated personalities. Transcript-analysis run over the en / en-orig / ml subtitle tracks is a one-shot speaker-inventory mining opportunity that closes the inner-circle attribution gap for the case.

The India trail — Calicut as operations origin + Indian-MCA disclosure + Kerala SP cyber-crime route

The India trail is broader and older than the UAE trail22. Calicut (Kozhikode), Kerala is the operator's talent / call-centre / CRM / influencer / analytics origin. The UAE-side branding is the public face; Calicut is where the operation is actually run.

30.1   Calicut connections matrix

SurfaceCalicut connection
Dilshad's personal originBorn Calicut / Kerala; primary social network is Malayalam-speaking diaspora
GetLead CRMgetleadcrm.com registered Calicut; +91 84 5355 5000 Calicut sales line
Coders Bunch"Mag Nexa Bangkok + Calicut" claim — listed as in-house dev shop
Metric MotiveCalicut-registered tech contractor (domain parked)
Getlead Analytics Pvt LtdIndian MCA-registered private limited; CRM operations
@Momsandwives YouTubeMalayalam-language host; RJ Fazlu + RJ Vysakh = Malayalam radio personalities
Dubai Vartha 17 May 2021Malayalam-language UAE news channel paid-feature for wholzale.com
+91 90 3781 2288India mobile (Kerala) D Express WhatsApp behind UAE-displayed phone
+91 84 5355 5000India mobile (Kerala) GetLead CRM Calicut
Apple App StoreApps registered under Indian regional store ("Muhammed Dilshad" personal-name developer ID 1786185813)

30.2   Indian MCA disclosure path

Indian Ministry of Corporate Affairs (MCA) public register search should surface:

The directors' AAdhaar / PAN cross-references will tie Indian-side operations to the natural persons. Typical Indian Pvt Ltd has 2 directors minimum — those names are the second tier of operator natural-person attribution beyond Dilshad himself.

30.3   Kerala State Police cyber-crime route

If any Kerala-resident victim has filed a cyber-crime complaint against Mirage by MAG / Matajar Group / D Express / Moms & Wives, the operator is on a Kerala police register. Direct outreach to Kerala SP-level cyber-crime through Indian Embassy Abu Dhabi → Kerala Embassy Dubai → state-police liaison is the access route.

30.4   Dubai Vartha 2021 paid-feature disclosure target

User-supplied Facebook Reel from Matajargroup.com confirms a paid promotional feature on Dubai Vartha (ദുബായ് വാർത്ത = "Dubai News"), a Malayalam-language UAE news channel targeting Kerala-diaspora audience. Aired in the "Night Updates" segment dated 17 May 2021, promoting www.wholzale.com.

Dubai Vartha holds records of every paid promotional feature: contract, payment, invoice, contact person. Disclosure target for the Kerala-diaspora-affinity-fraud track — this anchors a 2021 operator spend to a specific named individual on the operator side.

Multi-address operations — six surfaced Dubai addresses + Plus Code 57V6+JF overlap

The operator publishes at least six distinct Dubai addresses across different surfaces21:

AddressSource
Suite 110 / 1103 Rawdat Al Wasl, Near Business Bay Metromatajargroup.com contact-us / about-us
Port Saeed, Centurion Tower, Block B, Suite 1103Matajar Online UAE LinkedIn page
Rawdat Al Wasl Building 206, Sheikh Zayed Rd, Office 11032GIS Dubai
Matajar E Commerce Back office, 25 34 St, Port SaeedTrade Mirage Investment GMB
Sheikh Zayed Road, Dubai (HR posters)Trade Mirage + Matajar Group hiring posters
Business Bay, DubaiMatajargroup.com Facebook Page

Either the operator runs across multiple physical premises OR the same physical building is described differently across surfaces. Both interpretations are operationally significant — multiple addresses fragment regulator-search surface; identical-building-with-different-labels signals deliberate misdirection.

The two Google Business Profiles (Trade Mirage Investment + Matajar Group) share Plus Code 57V6+JF Dubai — same building. Matajar Group is marked "Temporarily closed" on Google Maps, while Trade Mirage Investment is operational with a 4.6-star rating and a category of "Business development service" (a regulator-search-dodge category).

On-chain track — confirmed zero operator presence + subpoena-only attribution path

32.1   The on-chain audit (12 brand strings tested across 6 registries)

Operator brand strings cross-searched across ENS, Unstoppable Domains, Lens Protocol, Farcaster, OpenSea, Etherscan, Arkham Intelligence22. Zero matches for any operator-attributable wallet, label, or entity.

RegistryResult
ENSNone of matajar.eth, mirage.eth, trademirage.eth, magnexa.eth, dexpress.eth, dcars.eth, bizfuel.eth, momsandwives.eth, dilshad.eth, poschner.eth, etc. registered to operator-attributable wallet
Unstoppable DomainsSame 12 strings × .crypto / .nft / .x / .wallet / .bitcoin / .dao / .888 / .zil / .blockchain / .polygon — no matches
Lens Protocol@matajar.lens, @mirage.lens, @dilshad.lens, etc. — no matches
Farcaster@matajar, @mirage, @dilshad, etc. — no matches (only unrelated handles)
OpenSeaBrand-string collection search — only unrelated NFT projects ("Mirage" gaming PoE, MAG NEXA unrelated artist)
Etherscan / ArkhamBrand-string label / entity search — no operator-attributable matches

32.2   What the negative finding means

The operator runs in 2024-2026 with a pre-2018 web2-only mental model. They did not register the obvious brand strings as ENS / Unstoppable / Lens / Farcaster handles before launching. Combined with the in-page HTML scan (archive 18) — zero on-chain wallet addresses in any operator HTML, zero MetaMask / WalletConnect / RainbowKit / web3modal / wagmi / viem provider integration anywhere across the operator's WordPress estate — the operator's "crypto investment platform" claim is purely promotional. There is no underlying on-chain operation to trace.

32.3   The withdrawal-trap interpretation

The 5-tier yield ladder (5%-12% monthly across 6 coins) lifted from trademirage.com is delivered without any on-chain wiring. There is no smart contract to audit, no transparent ROI source, no on-chain trade flow. The "algorithmic trading bot for BTC/ETH/SOL/XRP/DOGE/ADA" claim is a verbal pitch backed by a dashboard (mirage11.aiappz.com) with no client-side web3 connection — the "trades" are server-side ledger entries displayed to investors as if they were real. Investor capital flows IN via fiat (UAE bank, card, AED-stable exchange) and is presented to investor via a server-rendered dashboard showing fictitious returns. Withdrawal requests trigger an escalating "fee" sequence intended to either (a) extract additional capital under the guise of release fees, or (b) delay withdrawal until the investor gives up.

32.4   Subpoena-only attribution path

The on-chain audit confirms there is no public-web on-chain track. The traceable on-chain evidence necessarily resides in:

  1. Coinbase / Binance / Kraken / OKX subpoena response — operator notebook p.53 names "Coinbase" specifically; the 17-coin shortlist on p.52 is the working pitch coin list. If the operator deposits investor capital into any centralised exchange under their natural-person identity, that exchange's KYC-tied account is the only reliable on-chain attribution path.
  2. Forensic disk imaging of R730 + Mac PC — likely to surface seed phrases, wallet-software installations (MetaMask Chrome extension state, Ledger Live, Trust Wallet, Trezor Suite), exchange API keys in browser auto-fill, exchange password manager exports.
  3. Bank-record subpoena to UAE / Indian / Egyptian banking partners — operator deposits investor AED / USDT into corporate accounts; the AED-to-stablecoin conversion record at the operator's exchange OTC desk is the inflection point for traced-money.

Subpoena / disclosure targets matrix (combined with forensic imaging chain)

TargetWhat to askWhy
Coinbase Inc. (San Francisco) KYC-tied account for Muhammed Dilshad / Mirage by MAG Investment LLC / Matajar Group Ltd / Mirage Brokerage Co (Egypt) / Mirage Brokerage AZ LLC Notebook p.53 names Coinbase; primary suspected exchange
Binance Holdings Ltd / Binance.AE Same KYC-tied account search Largest UAE crypto on-ramp
Apple Inc. Developer ID 1786185813 ("Muhammed Dilshad") billing identity, payment method, refund history, login IPs Direct natural-person liability handle
Alphabet Inc. (Google Play) "Moms and Wives" Play Console developer billing identity Same as above for Android
Amazon Web Services dabbab-bucket S3 bucket account holder + bucket contents Bahrain-region infra subpoena
Microsoft Inc. Microsoft 365 tenant for matajargroup.com (token MS=ms83057961) — admin identity, MFA history, audit logs Tenant admin = leadership identity
Meta Platforms Inc. Page admin lists + ad-account billing identity for Matajargroup, Mirage by Mag, Moms & Wives, Dilshad personal Cross-jurisdictional admin location reveals collaboration
Hostinger International Ltd Domain registrant identity for operator-domain bundle (matajargroup.com etc.) Per archive 19 capture
YouTube (Alphabet) Channel ownership + monetisation identity for @Momsandwives + @Dhilshadthoughts Calicut-side spend evidence
Indian MCA Coders Bunch + Metric Motive + Getlead Analytics Pvt Ltd director records Indian-side natural-person attribution
Kerala State Police (cyber-crime cell) Existing victim complaints against Mirage by MAG / Matajar Group / D Express / Moms & Wives Pre-existing complaint register
Dubai Vartha 17 May 2021 paid-feature contract / payment / contact person for Wholzale segment 2021 operator-spend anchor
Egyptian FRA (Financial Regulatory Authority) Mirage Holding Company + Mirage Brokerage Co (EGX member 1148) license records, ownership chain Egyptian-side regulatory attestation cross-check
Arizona Corporation Commission AZ MIRAGE BROKERAGE COMPANY (file 02365995) + Anthony Maggio + linked entities Arizona-side filing chain

Each subpoena should request: account-holder identity (legal name, registered ID type + number, registration date) · payment-method history (cards, bank accounts, wire instructions) · login history (IPs, device fingerprints, geolocation, timestamps last 24 months) · communication content where applicable · MFA recovery contacts (alternate email + phone — surfaces operator's actual reach identity).

Case readiness summary — what's confirmed, what's pending, what's next

ElementStatusSource
Regulator-flagged fraud entityConfirmedADGM/FSRA alert 2025-12-04 (archive 1)
Operator natural-person identityMulti-sourceDhilshad personal profiles, Apple Developer ID, FB birthday post (archives 8, 16, 18, 21)
Co-operator (Germany side)IdentifiedDennis Poschner, e36-verdeck cover (archives 3, 18)
Multi-brand fraud networkMapped9 brands, 4 brand-shadows, 5 tech-arm labels (archives 7, 13, 17, 21)
Self-incrimination exhibits5 exhibits capturedmatajargroup.com live as of 2026-05-05 (archive 21, 22)
Multi-jurisdictional structureMappedUAE + Egypt + Arizona + Calicut + Bangkok + Germany (archives 7, 12, 13, 18, 22)
Withdrawal-trap fraud modelConfirmedZorya review + ADGM alert + 9-product yield-incompatibility (archives 5, 17, 21)
Selective-WhatsApp scrubInvestigator-confirmedPhone test sweep 2026-05-05 (archive 21)
On-chain attributionSubpoena-onlyCoinbase + Binance subpoena required (archive 22)
Internal pitch materialImaging-onlyR730 + Mac PC forensic imaging required (archives 21, 22)
Victim testimony⏳ Pending"57 Investigations Ltd" channel via Zorya Capital (archive 5)

The case is now regulator-hand-off-ready on the documentary side. The five matajargroup.com self-incrimination exhibits alone are sufficient to compel ADGM/FSRA + SCA + DFSA + FRA (Egypt) + SEC (Egypt) + AZCC + RBI + ED (India) + BaFin (Germany) coordinated action. The forensic imaging + subpoena chain converts the documentary case into a traced-money case.

Open-web research has plateaued on operator-side document discovery. The next inflection is hardware imaging.

To be continued… — dead ends, open threads, and the path to traced-money evidence

Open-web and passive-signals research has reached its natural plateau. The documentary case is regulator-hand-off-ready as of 2026-05-07. What follows is an honest accounting of exhausted approaches, paused threads awaiting resource decisions, and a four-step roadmap to the next evidentiary inflection point.

Confirmed dead ends

The approaches below have been worked to exhaustion. Further investment in the same channels is not proportionate.

ApproachScopeOutcome
On-chain blockchain registries ENS · Unstoppable Domains · Lens Protocol · Farcaster · OpenSea · Etherscan + Arkham — 12 brand strings × 6 registries = 72 lookups Zero results No operator presence in any public Web3 namespace. Cryptocurrency pitch is server-side theatre, not genuine on-chain activity.
Public document repositories Scribd · SlideShare · Academia.edu · Pastebin · GitHub — all operator brand and personal-name strings Zero results Deliberate-low-footprint posture confirmed. No pitch decks, term sheets, or internal docs in public repositories.
WhatsApp — regulator-flagged numbers +971 54 997 8780 (Trade Mirage HR) and all brand-associated lines Deactivated Selective-scrub pattern confirmed. Operator disabled brand-associated lines post-ADGM/FSRA alert while keeping live leadership funnel numbers active.
UAE public corporate registers (open web) MOE · MOHRE · ADGM · DIFC public-search interfaces Partial Registration existence confirmed; beneficial ownership hidden behind authenticated/subpoena barrier. No further yield possible without formal process.

Interrupted threads — paused, not abandoned

These lines of inquiry remain viable but require additional resource, access, or a trigger event before proceeding.

ThreadWhat it requiresExpected yield
Reverse-image search — Dilshad face photoPimEyes / Yandex Image / Google Lens runAdditional identity confirmations; undisclosed investor-facing profiles or prior-brand appearances
MEGA APP LAUNCH — 54-video playlistTranscript extraction + speaker-name inventoryFull affiliate / influencer network map; commissionable agents for victim outreach
Indian MCA registerLookups: Coders Bunch · Metric Motive · Getlead Analytics Pvt LtdDirector network; registered capital; beneficial ownership chain for Calicut operations arm
Thai DBD registerLookup: Mag Nexa Co. Ltd, BangkokConfirms or refutes "flagship luxury resort development in Thailand" construction claim
Dubai RTA registerLookup: Mirage by Mag Car Rental L.L.C. fleet & depotFleet count, RTA licence status — corroborates or refutes operational legitimacy claim
Credential breach databasesHIBP · Dehashed · IntelX (paid) — 3 humble-beginnings GmailsPassword reuse, alternative accounts, earlier usernames, linked phone numbers
WhatsApp sweep — remaining phonesManual test: 8 untested numbers from consolidated 14-phone inventoryMaps current operational communications posture post-seizure
Wayback Machine preservation/save/ submissions — 5 live self-incrimination pages on matajargroup.comLegally-admissible archived copies; protects exhibits against operator takedown before regulator acts

Step 1 — Access decommissioned hardware and software

Hardware in custody — status at seizure (2026-04-30)
Dell PowerEdge R730 · local IP 192.168.1.40 · MAC B0:83:FE:D1:24:29 · VMware ESXi hypervisor — powered down, air-gapped. Large Mac PC — also in room, air-gapped at seizure. Neither device has been forensically imaged.

Forensic imaging of both seized devices is the single highest-yield action available and carries no external cost beyond investigator time and write-blocking hardware. It must precede every other resource-intensive step on this list.

DeviceExpected contents once imagedPriority
Dell PowerEdge R730
VMware ESXi · RAID array · 2U rack
Guest VM filesystems containing: forex platform application database (trades ledger, balances, user accounts = complete victim list), internal CRM, call-centre records, communications archives, deleted financial records, possible cryptocurrency wallet files and exchange API keys, payment-processor integration credentials Critical — image first
Mac PC
Air-gapped at seizure · unknown OS
Operator iMessage / WhatsApp Desktop / email archives, design and marketing assets, macOS Keychain credential store, Safari / Chrome browser history, possible screen recordings, local file sync caches (Dropbox / iCloud) High — image second

Recommended tooling: FTK Imager (free, Windows) or dc3dd to write-blocked target drives. All images must be verified with SHA-256 before analysis. Chain-of-custody log must record: examiner, date/time, source device serial, image hash, and storage location of master copy.

Step 2 — Mechanical hard drives: specialist forensic recovery service

The R730 will contain mechanical SATA or SAS drives in a RAID configuration. The appropriate recovery approach depends entirely on physical and logical drive condition, which cannot be assessed without first attempting standard imaging.

Drive condition (determined at imaging)Recovery approachEstimated costRecommendation
Intact · RAID online or reconstructible Standard forensic imaging + RAID reconstruction + file-system parsing (Autopsy / Sleuth Kit) £0–500 (investigator time, free tools) Proceed immediately
Quick-format · logical wipe (partition table overwritten, data intact) File carving on raw image — PhotoRec / Scalpel typically recover 50–80% of file content £0 (PhotoRec / Scalpel are free) Attempt before paying anything
Full overwrite (dd-zero or multi-pass wipe) Specialist recovery is unlikely to yield meaningful data. Confirmed deletion is itself evidentially significant — documents deliberate concealment £800–6,000 (largely irrecoverable) Do not commission — document the wipe instead
Physical damage — head crash, seized spindle, platter scoring Clean-room specialist (Ontrack / DriveSavers / Vogon International) £1,000–8,000 per drive · 3–8 weeks Commission only if case reaches prosecution stage
Is specialist recovery worth paying for at this stage?
No — not yet. Physical damage has not been confirmed and may not exist. The correct sequence is: image first using standard tools → attempt file-carving on any wiped partitions → only then commission specialist recovery if physical damage is confirmed. Spending £5,000+ before knowing the drive condition is disproportionate. At prosecution stage, specialist recovery costs are potentially recoverable from the defendant as part of a confiscation order.

Step 3 — Cryptocurrency blockchain data mining and combing

The on-chain audit confirmed zero operator presence in public Web3 namespaces. This does not rule out cryptocurrency involvement — it means no wallet addresses have been identified yet. The only known on-chain lead is "Coinbase" written in the seized notebook (page 53). Blockchain combing is therefore address-finding first, chain-tracing second: seed addresses must come from hardware imaging, subpoenas, or victim disclosures before analytics tools can be applied meaningfully.

Tool / ServiceUse caseMonthly costWeekly equiv.
Arkham IntelligenceEntity labelling, address clustering, cross-chain coverage. First tool to deploy once a seed address is found.Free / ~$50 upgrade~$12
NansenWallet profiling, DeFi/EVM exposure, whale-wallet alerts. Deploy alongside Arkham for ERC-20 chains.~$150 (Starter)~$37
Etherscan / BSCScan / TronscanManual tracing and transaction-graph building — free, time-intensive, sufficient for initial hypothesisFree£0
Chainalysis ReactorLEA-grade professional tracing with attribution database. Appropriate at prosecution/asset-confiscation stage only.~$1,250–2,500 (enterprise)Not applicable pre-prosecution
Coinbase / Binance formal subpoenaThe only authoritative path to confirmed accounts, KYC data, and transaction historyLegal cost onlyN/A — formal legal process required
Revised objective and weekly budget — blockchain phase
Do not budget for blockchain combing tools until hardware imaging is complete. Imaging will either yield wallet files, exchange API keys, or transaction logs that provide seed addresses — making Arkham + Nansen immediately actionable at ~£500–800 total for a 6-week sweep (~£80–150/week in tool costs) — or confirm that cryptocurrency was presentational only and that the money trail runs exclusively through conventional banking, requiring only subpoenas. Current recommended blockchain budget: £0/week pre-imaging. £80–150/week post-imaging, if seed addresses are found.

Step 4 — Plan next move: three decision nodes

Three parallel paths are available based on evidence compiled to date. They are not mutually exclusive; the choice of sequencing is an executive and legal-counsel decision.

PathDocumentary threshold met?Next required actionExpected outcome
A — Regulatory referral
Immediate
Yes — today Package §1–§34 + 5 self-incrimination exhibits → submit to ADGM/FSRA · SCA · DFSA · FRA Egypt · BaFin Germany · RBI India · ED India Freeze orders, public consumer warnings, coordinated multi-jurisdiction regulatory action. Operators lose licences and public-facing infrastructure.
B — Criminal prosecution
Hardware-gated
Not yet Hardware imaging → identified financial records → subpoena chain (Coinbase · Apple · AWS S3) → traced-money evidence → UAE / German / Indian prosecution referral Custodial sentences, criminal asset confiscation, operator extradition exposure. Requires £15,000–50,000+ in sustained legal and forensic investment.
C — Civil asset recovery
Victim-list-gated
Not yet Hardware imaging for victim database → identify assets under operator control → freezing injunction + civil judgment in UAE or England Direct financial recovery for identified victims. Costs recoverable if assets are found and freezing is achieved pre-dissipation.
Divergence Systems assessment — 2026-05-07
Path A can and should be initiated now — the documentary threshold is met and it carries no additional cost. Paths B and C share one common first dependency: forensic imaging of the seized hardware. That action — which requires no external spend — is the single gate to all subsequent investigative and legal escalation. The investigation is not blocked by evidence. It is waiting for the hardware to be imaged.23

Technology Infrastructure — Proposed Engagement

The investigative findings documented in this report create a foundation for a purpose-built intelligence infrastructure. The following steps represent a natural continuation of this work — moving from a one-time forensic report to a persistent, queryable system for ongoing case management, evidence organisation, and regulatory submission.

Each item below is a discrete, scoped engagement. None is required to use the findings already delivered. All are available on request.

Step 1 — Paid

Algorithm Design

Design of the core processing logic for a custom MCP (Model Context Protocol) server tailored to this case. Covers request routing, tool-call handling, failure recovery, and the intelligence layer that determines how queries against case data are resolved. This is bespoke per engagement — no off-the-shelf equivalent exists for investigation-grade workflows.

Step 2 — Paid

Data Modelling

Schema design for all evidence classes captured in this investigation: entities, domains, phones, emails, financial flows, corporate structures, social media artefacts, and chain-of-custody records. A well-modelled schema at this stage eliminates re-indexing costs later and is a prerequisite for any reliable regulatory submission package.

Step 3 — Paid

Storage & Retrieval Architecture

Selection and configuration of the appropriate storage stack — vector database, relational, hybrid, or cache-layer — and design of the read/write paths that serve the intelligence layer. This decision directly controls per-query latency and ongoing API cost. Poorly architected retrieval at this stage creates compounding infrastructure debt.

Step 4 — Advisory

API Cost Projection

Before any build begins, Divergence Systems can model your expected monthly spend across inference, storage, and retrieval — in three scenarios (conservative / expected / peak) — and size the architecture to the budget, not the other way around.

This projection is only as accurate as the brief. To produce a meaningful number we need to understand the objective: what data is being accessed, how often, by whom, and what a successful outcome looks like.

If you would like to progress any of the above, Divergence Systems can organise a scoped quote — typically returned within 48 hours of receiving a brief.

Contact: info@divergence.systems

Appendices

Appendix A — Social-media captures (2026-05-05 batch) — full inline render of case-archive/archive/15_social_media_captures.md.

Appendix B — Notebook digitisation (81 pages) — full inline render of documents-analysis.md.

Appendix C — Photo evidence inventory — thumbnail grid with EXIF metadata.

Appendix D — YouTube channel index — table of 142 videos with key transcript keywords.

Appendix E — Update log — append the standalone-HTML build step.

Appendix F — Glossary.

Appendix G — How this report was produced — methodology & tools.

Footnotes / source archive

Every numbered footnote anchor points back to a specific archive file at project/case-archive/archive/. Open any file in a Markdown viewer for the full source-attributed material that backs the claim above.

  1. 01_adgm_alert.md — ADGM/FSRA fraud alert (2025-12-04).
  2. 02_etrade_miragebrokerage_net.md — Egyptian Mirage Brokerage's etrade- site.
  3. 03_dennis_poschner_search_results.md — Dennis Poschner public-record findings.
  4. 04_coreto_ag.md — Coreto AG corporate verification, R960 invoice.
  5. 05_trademirage_zoryacapital_review.md — third-party scam review of trademirage.com.
  6. 06_whois_three_mirage_domains.md — WHOIS for 4 operator domains.
  7. 07_matajar_group_parent_entity.md — Matajar Group parent-entity breakthrough.
  8. 08_dhilshad_personal_profile.md — Muhammed Dhilshad personal-profile dossier.
  9. 09_mirage_development_unrelated.md — Mirage Development (Abu Dhabi consultancy) — unrelated.
  10. 10_mirage_brokerage_co_linkedin.md — Mirage Brokerage Co LinkedIn page (47 employees).
  11. 11_mirage_brokerage_play_store_app.md — Mirage Brokerage Co Play Store app.
  12. 12_arizona_llc_mirage_brokerage.md — Arizona LLC + Anthony Maggio.
  13. 13_mirage_by_mag_corporate_family.md — three "Mirage by MAG" sister LLCs + D Express scheme.
  14. 14_brand_confusion_disambiguation.md — brand-collision exclusions + NEXA Bali affinity-fraud lead.
  15. 15_social_media_captures.md — 2026-05-05 social-media public-layer capture.
  16. 16_research_pass_5tracks.md — five-track research pass: yt-dlp title-mining + sister-subsidiary deep dives (Mirage International Trading 2006, Mirage by MAG since 2010, Wholzale.com, Vansale by Bizfuel, Moms & Wives MLM, GetLead CRM Calicut, Shafeeq Moossa Sharjah/JAFZA links, second Dubai office).
  17. 17_firecrawl_advertiser_pass.md — Firecrawl content capture of every operator domain + Meta Ad Library + Google Ads Transparency + Wayback availability: "MIRAGE HOLDING INVESTMENT" brand identity, verbatim 5-tier yield-ladder, Meta ads still active 134 days post-ADGM alert, 0 Google ads, NEVER archived on Wayback (anomaly).
  18. 18_code_level_and_operator_history.md — code-level scan (no on-chain wallets in operator HTML; "Coinbase" named in notebook p.53 as routing exchange; 17-coin shortlist p.52); Dilshad's family origin established at Sharjah Gold Souk early-2000s; 3 new operator domains (magnexa.ai, do-verify.com, metricmotive.ai); Do-Verify misrepresented as KYC; Bangkok phone + UAE landline + new emails captured.
  19. 19_dns_and_advertiser_tokens.md — current + historical DNS records for 22 operator domains; advertiser-platform verification tokens (Microsoft 365 tenant MS=ms83057961, Facebook Business Manager, Google site verification); zero analytics pixels despite 100+ active Meta ads; 3 operator domains DNS-decommissioned post-seizure (e36-verdeck.de, wholzale.com, baqalat.express).
  20. 20_phone_pdf_negative_findings.md — phone × PDF / Scribd / SlideShare / Academia / Pastebin / GitHub negative-finding pass; Taryam Omran Investments (Sharjah, toh.ae) brand-shadow lead (operator alias "Bintaryam" = bin Taryam); deliberate-low-footprint posture confirmation.
  21. 21_consolidated_fb_appstore_brandshadow.md — consolidated batch (FB Page intel + App Store / Play Store dev accounts + Google Business profiles + 4-instance brand-shadow signature + 5 self-incrimination exhibits on matajargroup.com + 14-phone consolidated inventory + WhatsApp selective-scrub pattern + 12-email inventory + Dilshad face photo + @Momsandwives YouTube yt-dlp mirror 206 videos + Dubai Vartha 17 May 2021 paid feature + 8 operational unsophistication signals).
  22. 22_onchain_deadend_and_india_trail.md — on-chain audit (ENS + Unstoppable + Lens + Farcaster + OpenSea + Etherscan + Arkham — confirmed zero operator presence) + India trail consolidation (Calicut as operations origin, Indian MCA disclosure path, Kerala State Police cyber-crime route, Dubai Vartha disclosure target) + matajargroup.com self-incrimination corpus in regulator-hand-off form + forensic-imaging path forward + subpoena targets matrix + case readiness summary.
  23. 23_dead_ends_and_next_steps.md — confirmed dead ends registry (4 closed tracks), interrupted threads registry (8 open threads), hardware imaging priority framework (R730 + Mac PC), mechanical hard drive specialist recovery decision matrix (cost/benefit at each damage tier), blockchain analytics tool comparison and weekly budget rationale, and three-path executive decision framework (Path A: regulatory referral; Path B: criminal prosecution; Path C: civil recovery).