Forensic Analysis, Compendium & Evidence System
UAE Dell Server Investigation — "Mirage by MAG / Trade Mirage" investment-fraud operation, corporate parent Matajar Group, UAE-side and German-side operators.
This dossier is privileged investigative work product prepared by Divergence Systems. It is intended for internal review first, then — on counsel approval — onward distribution to designated regulator and law-enforcement counterparts. It is not a press document, marketing collateral, or public release.
Evidence in this dossier was collected on-site on 2026-04-30 by Divergence Systems
staff (Apo and Fox). Hardware and notebooks were photographed in situ; the on-site team's
Surface tablet appearing on the seized-network screenshots (host TABLET-JVQFGF9E,
192.168.1.25) is investigation kit and is excluded from operator
inventory throughout this report.
To cite a specific finding, use the format
DUBAI-SERVER-agy report v0.1.0 §X.Y
and reference the underlying archive file under project/case-archive/archive/NN_*.md.
Forward any redistribution request to
info@divergence.systems before sharing.
A two-tier investment-fraud operation under the "Mirage" brand — regulator-confirmed
by ADGM/FSRA on 2025-12-04 as "Mirage by MAG Investment LLC / Trade Mirage",
with infrastructure seized on-site by Divergence Systems on 2026-04-30. The operation is the
investment arm of Matajar Group — a Dubai corporate parent owned by
Muhammed Dhilshad / Dilshad Muhammed — with a German operator-side cell
stamped in seized notebooks as "MIRAGE E-TRADE LLC" (Sharjah, P.O. Box 5045), those notebooks
confirmed by on-site staff to belong to Dennis Poschner (Offenburg, Germany). The
advertised model is a "physics-of-finance" 6-coin (ETH/SOL/DOGE/BCH/TON/FIL) algorithmic trading bot
promising 12% per 30 days, with reinvestment into a target portfolio of 229–289 Dubai
houses worth USD 1.144 billion. The actual operational mechanic — per third-party reviews
of trademirage.com — is a withdrawal-trap fee-stacking advance-fee fraud.
[1]
Dilshad Muhammed publicly self-identifies Trade Mirage as part of the Matajar Group on his own LinkedIn. In his 2025 New Year LinkedIn post, the hashtag bundle reads:
linkedin.com/posts/dilshad-muhammed-29590171_happynewyear-welcome2025-matajargroup-activity-7280134503208005632-z4rD ·
captured publicly without authentication, 2026-05-05.
[15]
This places #trademirage alphabetically and operationally adjacent to four confirmed
Matajar subsidiaries (#matajargroup, #bizfuel, #matajarecommerce,
#matajarrealestate) and to the operator's own personal-brand tag
#dhilshadmatajar. It is a direct operator-side admission that Trade Mirage is a
Matajar product — removing any plausible-deniability defence that the two operations were
unrelated. Time-critical: archive to Wayback / archive.today and screenshot before the post is
edited or deleted.
A subsequent research pass [16] surfaced
at least 19 dedicated Trade Mirage / Mirage International / Mirage Trading video titles
on Dilshad's personal YouTube channel @Dhilshadthoughts — including a 2025-03-18
Short literally titled Trade mirage By #Matajar Group #matajargroup — establishing a
second independent operator-side admission across a second platform. The same pass established
Mirage International Trading as a Matajar entity since 2006 and the
Mirage by MAG Investment LLC operating licence as continuously held since 2010,
both per Matajar's own About-Us page. The corporate ecosystem behind the ADGM-flagged scheme is
20 years old and multi-jurisdiction, not a recent shell.
Figure 1.1 — Top-level entity map. An SVG entity-relation diagram is rendered here at build
time from case-archive/archive/graph/nodes_edges.json (filtered to layers ≤ 7).
Lines indicate identified relationships; dotted lines indicate suspected relationships pending
confirmation. Pending build-time renderer.
Dennis Poschner (DE)
Offenburg, Germany
e36-verdeck.de (auto-parts cover)
▼
Seized handwritten notebooks
"MIRAGE E-TRADE LLC" Sharjah stamp
6-coin DSA model + 12%/month + $1.14B Dubai-property exit plan
│
▼ (likely partnership / franchise)
│
Muhammed Dhilshad (UAE Golden Visa)
Matajar Group (Dubai) — parent
├── Mirage by MAG Investment LLC ◀── ADGM/FSRA fraud alert (2025-12-04)
│ └── Trade Mirage (trademirage.com — now parked)
│ └── Instagram @mirage_by_mag
├── MAG NEXA (4%/month investment vehicle)
├── Matajar E-Commerce / Dabbab Express (legitimate cover)
├── D Cars, D Express, Bizfuel, Moms & Wives, Get Lead
└── Metric Motive (Calicut, India)
Dennis Poschner
Technical / quantitative — author of the seized notebooks.
Muhammed Dhilshad / Dilshad Muhammed
Corporate / marketing — CEO of Matajar E-Commerce LLC, public face of Matajar Group.
The Matajar Group runs five concurrent yield-promise products at five distinct entry points — all openly published on operator-controlled pages.[17] The lowest tier (D Express subscription, AED 6,000 entry) is the gateway product framed as a grocery-loyalty subscription; the apex tier (Trade Mirage, 12% / month) is the ADGM-flagged forex bot. [13]
Operationally critical: Meta is still serving ads for both Mirage by MAG and Trade Mirage with start dates as recent as 2026-04-17 — 134 days after the ADGM/FSRA fraud alert. By contrast, Google Ads Transparency Center reports 0 ads across all 5 operator domains in the UAE, so the operator's paid-acquisition funnel runs exclusively through Meta. None of the 8 operator-controlled domains have ever been archived by Wayback Machine — the negative finding is itself anomalous and suggests deliberate archive-suppression. [17]
| Workstream | Done in this report | Pending |
|---|---|---|
| Hardware identification | R730 + asset tags + on-site photos digitised | Read-only disk imaging; ESXi + iDRAC log pull |
| Notebook digitisation | All 81 photographed pages digitised (model, formulas, exit narrative, stamps) | Counsel review of handwriting attribution chain-of-custody |
| Suspect identification | Dennis Poschner (DE) + Muhammed Dhilshad (UAE) — both HIGH confidence | Photographic ID confirmation (PimEyes / Yandex face search with auth) |
| Corporate family | Matajar Group → 3 "Mirage by MAG" sister LLCs documented; brand-collision exclusions | Sharjah SEDD + Dubai DED + ADGM register lookups |
| Domain WHOIS | 5 operator-controlled domains documented, subpoena targets identified | GoDaddy / DBP / Wix disclosure (US legal process) |
| Social-media archive | Public layer captured (LinkedIn posts, YouTube channel mirror, Egyptian broker) | Authenticated-session capture for the 47-employee LinkedIn list, IG, FB |
| Regulator action | ADGM/FSRA alert (2025-12-04) captured | BaFin (DE), Sharjah SEDD, Dubai DED, Egyptian FRA, Arizona AZCC |
§2.1 ADGM/FSRA fraud alert (2025-12-04). Full quote of the alert + screenshot will render
here at build time from case-archive/archive/01_adgm_alert.md.
§2.2 Chain of custody — 2026-04-30 seizure. Photo strip of 4 hero images, captioned
"Figure 2.1 — Hardware seizure sequence". Source: case-evidence/photos/hardware/.
§2.3 Seized hardware — Dell PowerEdge R730 with "MIRAGE E-TRADE LLC" stamp.
Annotated photo of the asset tag and chassis stamp. Source: visual-evidence-sequence.md.
§2.4 Seized notebooks — 81 photographed pages. Mosaic of 9 representative pages with
captions. Source: documents-analysis.md.
The seized notebooks were confirmed on-site (2026-04-30) by Divergence Systems staff to belong
to and have been written by Dennis Poschner. They contain the full "Data Search Algorithm"
(DSA) / "BTC Search Algorithm" (BSA) derivation, the 12%-per-30-days formula
P_n(h) = h · n / 21,600,000, and the USD 1.144 billion exit narrative — all
consistent with a single author's handwriting and reasoning style across the 81 pages.
e36-verdeck.de/impressum):
Fischerstraße 1d, 77652 Offenburg, Germany.e36verdeck@gmail.com.de.linkedin.com/in/dennis-poschner-37b286225 ("Precise. Tech…" snippet);
de.linkedin.com/in/dennis-poschner-706687348. Disambiguation pending
authenticated-session capture.facebook.com/dennis.poschner.case-archive/archive/04_coreto_ag.md.
Coreto is a verified-legitimate German Dell reseller; their disclosure on the customer file
provides payment + ship-to + correspondence. [4]linkedin.com/in/dilshad-muhammed-29590171 —
6,866 followers, 492 posts, 500+ connections, login-walled to public capture.matajargroup.com.matajargroup.com/about-us/.#trademirage with confirmed Matajar subsidiaries.@Dhilshadthoughts channel (display name "Dilshad
Mohammad"), 142 videos, mirrored 2026-05-05 via yt-dlp in metadata-only mode
to case-archive/archive/captures/youtube/. Sample titles: "Forex trade Better
Strategy", "Matajargroup.com", "my opinion 16".
[15]| Date | Subject | Significance |
|---|---|---|
| ~2023 | Matajar grocery-app promo (Dubai/Sharjah/AbuDhabi/Ajman, 24+ categories) | Confirms the legitimate-cover side of Matajar's e-commerce business. |
| ~2024 | "Cars Now" app: luxury-car 2-yr lease, "no bank statements, cheques, or deposits" | Language consistent with bypassing bank-statement audit trail. Possibly a third Matajar car-rental brand alongside DCARS. |
| 2025-01-01 | New Year post (the smoking-gun hashtag bundle) | Direct operator-side admission that #trademirage is a Matajar brand. |
Anthony Maggio is the named contact on Arizona LLC file 02365995
("MIRAGE BROKERAGE COMPANY", incorporated 1991), and he is independently the founder of
Forza Capital Funding, Inc. (Scottsdale, AZ — a mortgage-broker firm). Forza's
Scottsdale address differs from the AZ Mirage Brokerage's Tempe address, which is consistent
with Maggio acting as a registered-agent / nominee for the AZ LLC rather than
a beneficial owner. He is a deposition witness — his fee-for-service records
would identify the actual beneficial owner of the AZ LLC.
[12]
§4.1 Matajar Group umbrella. Org chart (Figure 4.1) rendered from
case-archive/archive/07_matajar_group_parent_entity.md.
§4.2 The three "Mirage by MAG" sister LLCs. Three-card row from
case-archive/archive/13_mirage_by_mag_corporate_family.md.
§4.3 Hidden D Express subscription scheme. Direct quote of the AED 6,000 / AED 300 monthly returns wording + comparative chart.
§4.4 Brand-collision exclusions. Diagram + reasoning from
case-archive/archive/14_brand_confusion_disambiguation.md, with NEXA Bali flagged as
possible affinity-fraud lead.
§5.1 Operator-controlled domains — table from
06_whois_three_mirage_domains.md + 13_mirage_by_mag_corporate_family.md.
§5.2 WHOIS evidence and subpoena targets — named third parties + jurisdictional process for each.
§5.3 Hosting + LAN topology (Figure 5.1) — diagram with the Divergence Systems Surface (192.168.1.25) clearly labelled as team kit.
§6.1 The 6-coin DSA / BSA framework. Reproduction + typeset
version from documents-analysis.md.
§6.2 The 12%-per-30-days formula. P_n(h) = h · n / 21,600,000.
§6.3 The exit narrative — USD 1.144B / 229–289 Dubai houses.
§6.4 The actual mechanic — Zorya Capital review of trademirage.com.
§7.1 Reading guide — layer / shape / edge legend.
§7.2 Embedded 3D viz — inlined from
case-archive/archive/graph/index.html + nodes_edges.json.
§7.3 Static rendering — pre-rendered PNG snapshot at three angles.
§8.1 Keyword tracking matrix — interactive HTML table from
00_keyword_tracking_matrix.md.
§8.2 Visual reference matrix — same format applied to image assets.
| # | Action | Status |
|---|---|---|
| 1 | Wayback / archive.today snapshots of trademirage.com, matajargroup.com, e36-verdeck.de, etrade-miragebrokerage.net | Pending |
| 2 | Manual archive of all suspect social media (public layer captured this report; login-walled layer flagged) | Done (partial) |
| 3 | yt-dlp mirror of @Dhilshadthoughts (142 videos, metadata + descriptions + multilingual subtitles) | Done |
| 4 | Capture 47-employee list on Mirage Brokerage Co LinkedIn (6 names + corporate facts captured; 41 names still login-walled) | Done (partial) |
Pending render. See archive/INDEX.md §9.
Pending render. Sharjah SEDD · Dubai DED · ADGM · Egyptian FRA · Arizona AZCC · Indian MCA.
Pending render. Image disks read-only · ESXi/iDRAC log pull · VM inventory · MAC cross-reference.
Pending render. Reverse-image searches · PimEyes · Yandex face · HaveIBeenPwned + IntelX + Dehashed for known emails.
The seized Dell PowerEdge R730 is the technical backbone of an integrated multi-product fraud pipeline. Each public-facing brand below is a distinct customer-acquisition surface that ultimately routes capital through the operator's infrastructure. ADGM/FSRA has flagged one of these brands; the others remain operational and unflagged at time of report.
Trade Mirage — operating under Mirage by MAG Investment LLC
Forex / 6-coin algorithmic trading bot. ADGM/FSRA fraud alert published 2025-12-04.
trademirage.com (parked); mirage-web-six.vercel.app (Vercel-removed clone); Instagram @mirage_by_magD Express subscription investment — licensed by Mirage by Mag L.L.C.
Grocery-delivery app with 4-tier subscription investment plan. 30 active Meta ad creatives — the most-advertised brand.[17]
+91 9037812288 behind a UAE-displayed phone — directly evidences Calicut call-centre on the front lineapps.apple.com/in/app/d-express/id6740457644 — registered in Indian App Store, not UAE — jurisdictional anomalyDCARS investment program — Mirage by Mag Car Rental L.L.C.
Car-rental and lease-to-own front; investment program at dcars.ae/investments/.
wa.me/+971502164944Dabbab Express Logistics Investment — matajargroup.com/subsidiaries/
Logistics-fleet investment fund openly published on the corporate site.
MAG NEXA premium investment — now repositioned as global holding
"Wellness, retreats, luxury resorts in Thailand, UAE, Europe, Bali."
nexauniverse.com) — see [14]Moms & Wives — momsandwives.com
Skill-marketplace / women-empowerment platform. 24 active Meta ads. iOS + Android apps live.
com.matajar.momsandwives); Apple (iOS dev account)Bizfuel · GetLead · Wholzale · Baqalat Express · Cars Now
B2B SaaS, CRM, B2B e-commerce — provides the day-to-day operational cover for the yield-promise layer above.
Mirage Brokerage Co (EGX member 1148) — etrade-miragebrokerage.net
Real EGX-registered Egyptian broker since 2006-11-29. Twitter @BrokerageMirage bio names parent as "Mirage Holding Company".
Do-Verify — do-verify.com
Marketed by Matajar/Mag Nexa as a "fast KYC, trusted onboarding and compliance workflows" platform. The actual published product is a generic checklist / to-do app.[18]
do-verify.com; Google (since the product offers Google-SSO sign-in via console.do-verify.com)The figures below are not Divergence Systems estimates. They are the operator's own arithmetic, taken verbatim from operator-controlled web pages and the seized handwritten notebooks. The projection therefore reads what the system was designed to move — the actual realised flows are an open question pending forensic disk imaging, Coinbase disclosure, and victim testimony.
| Product | Min entry | Stated monthly return | Stated annualised nominal | Lock-in |
|---|---|---|---|---|
| D Express tier-300 | AED 6,000 ≈ USD 1,633 | AED 300 ≈ USD 82 (5%) | ~80% (12 × 5%) | None ("full refund") |
| D Express tier-600 | AED 12,000 ≈ USD 3,267 | AED 600 ≈ USD 163 (5%) | ~80% | None |
| D Express tier-1250 | AED 25,000 ≈ USD 6,807 | AED 1,250 ≈ USD 340 (5%) | ~80% | None |
| D Express tier-3000 | AED 60,000 ≈ USD 16,338 | AED 3,000 ≈ USD 817 (5%) | ~80% | None |
| Logistics investment | AED 100,000 ≈ USD 27,228 | AED 4,000–6,000 (4–6%) | 48%–72% | 1 year |
| MAG NEXA premium | USD 25,000 | USD 1,000 (4%) | 48% | 3 years |
| Trade Mirage | (not published) | 12% per 30 days | ~290% (compounded) | Withdrawal-trapped per Zorya[5] |
The seized notebooks contain a fully-worked exit narrative on pages 70–72:
$1,144,900,000 total exit target
÷ ($4M per house, 1 sample) = 286 Dubai houses
÷ ($5M per house, 1 sample) = 229 Dubai houses
→ target portfolio: 229–289 Dubai-property residences
Reverse-derive per-investor capture for a 6-year ramp at 12%/m compounding:
$1,144,900,000 / (1.12)^72 ≈ $358 (incoming first month, theoretical)
— but this is the maths-pitch, not the realised flow. The withdrawal-trap
fee-stack (per Zorya) extracts USD 5–25K per fooled investor before they
abandon the platform.
Realistic capture per fooled investor (industry baseline for withdrawal-trap forex bots): USD 5,000–25,000 each. To approach the operator's stated $1.144 B exit target via this single product would require approximately 45,000–230,000 fooled investors. The five-tier ladder is therefore an investor-segmentation funnel — each tier captures a slice of the population with a price-discriminated entry point, summed.
The operator publishes inconsistent statistics across two corporate sites — both attributed to the same group, both naming Dilshad as CEO:
| Metric | matajargroup.com | magnexa.ai | Δ |
|---|---|---|---|
| App downloads | 145,000+ | 145K+ | matches |
| Active users | 50,000+ | 7.9 million + | ×158 |
| Loyal users | 7,000+ | 2.7 M+ | ×386 |
| Customer happiness | 99% | 388 + (?) | incompatible units |
| Combined revenue | (not stated) | ₹100 Cr+ (~USD 12M) | INR-denominated |
| Team members | (not stated) | 1000+ | — |
| Operating companies | (varies, 5–11 named) | 5 (or 6 — varies by page) | self-inconsistent |
The fact that the same operator publishes 50,000 users on one corporate page and 7.9 million on another indicates either deliberate inflation on one of the two sites or complete absence of editorial control. The use of Indian Rupees (₹) as the revenue unit on a UAE-Bangkok-Calicut multinational holding company is itself revealing — the financial accounting backbone is in Calicut.
C2 (Coinbase) as the routing exchange between
the algorithm output (`Analysiert(X) → ETH → C1`) and the trader's terminal
(Apple, i.e., the Mac PC seized in the same room).
[18]
A regex scan across every Firecrawl-captured operator domain HTML returned zero hits on any of:
Conclusion: the customer-facing fraud surface (Trade Mirage / D Express /
DCARS) does not expose any blockchain integration in its HTML. The deposit funnel runs as
customer → call-centre (Calicut WhatsApp +91 9037812288) → manual
onboarding → bank transfer or credit-card fee-stack. Any actual on-chain leg is
server-side on the seized R730 / Mac PC, or per-investor-generated and
exposed only to authenticated members in the (now offline) Trade Mirage member area.
A Coinbase US-legal-process request should query for accounts associated with any
of the following identifiers (any single hit may be sufficient to unlock the full account record).
Full list maintained in archive/18_*.md §2.8; abbreviated here:
| Class | Identifiers (representative) |
|---|---|
| Natural persons | Muhammed Dhilshad / Dilshad Muhammed / Dilshad Mohammad / Dilshad Backar / Dennis Poschner / Shafeeq Moossa |
| Corporate entities | Mirage by MAG Investment LLC · Mirage by Mag Car Rental L.L.C. · Mirage by Mag L.L.C. · Matajar E-Commerce LLC · Dabbab Express LLC · Bizfuel LLC · Mirage Holding Company · Mirage Brokerage Co · MIRAGE E-TRADE LLC · Mag Nexa Co., Ltd. · Coders Bunch Software Solutions |
| Email aliases | info@matajargroup.com · dilshadmd@matajargroup.com · dhilshad@matajar.ae · e36verdeck@gmail.com · mohamedkamalrakha@gmail.com · salamk05@gmail.com · info@magnexa.com · partnerships@magnexa.com · onlinerequest@miragebrokerage.net · miragebrokerage2@gmail.com |
| Phones (verified-account candidates) | +971 50 146 6750 · +971 52 622 3887 · +971 58 859 3159 · +971 56 333 5111 · +971 50 272 7891 · +971 50 216 4944 · +971 426 61924 · +66 65 932 1129 · +91 9037812288 · +91 8453 555 000 |
| Aliases / hostnames | Bintaryam / bin-taryam (LAN hostname pattern observed on the seized network) |
Independent of subpoena access, an on-chain signature-number match may be possible if the operator's accounting was numerically literal:
etherscan-py + web3.py for ETH; solana-py
for SOL. Free chain explorers' "address tag" features sometimes flag known scam addresses.
No specific wallet address strings (no `0x...`, no `bc1...`) are present in either (a) the digitised seized notebooks or (b) any operator-controlled HTML / Firecrawl capture. The operator wrote "Coinbase" by name in the notebooks but did not record specific wallet addresses in the captured pages — those are likely held in a separate physical ledger (yet to be located among the seized materials), in a digital file on the R730 or Mac PC, or memorised as seed-phrase-only.
Every operator-controlled, operator-adjacent, and brand-collision-excluded entity surfaced
to date, plotted on a single time axis (2000–2026) and grouped by corporate cluster.
Active bars end with ▶; ceased bars are cross-hatched with ✕;
bars with unknown start dates have a dotted left edge. The dashed red vertical line marks
the ADGM/FSRA fraud alert (2025-12-04).
Reading the timeline: The earliest operator-attached commerce starts at the Sharjah Gold Souk family shop (~2003). The Egyptian "Mirage Holding" cluster activates in 2006 — same year that Matajar self-attests its UAE-side "Mirage International Trading" — strongly suggesting a co-incorporation across the two jurisdictions. The UAE legal shell Mirage by MAG Investment LLC (since 2010) becomes the umbrella under which every later subsidiary is licensed. From 2017 onwards, the operating-brand layer churns roughly every 2–3 years (CandyBay → Matajar → Matajar by Nesto → Matajar Online → Dabbab Express / D Express), with each rebrand preserving the underlying licence. The five-tier yield-promise products are 2023–2024 vintage. The 2025 declaration of Mag Nexa as global holding adds Bangkok and Calicut as licensed jurisdictions — broadening the operation's legal-process surface across three countries.
The seized notebooks explicitly route through Coinbase
(notebook page 53: C2 (Coinbase))[18],
and the asset universe spans 17 named coins (notebook page 52). The table below catalogues
every crypto-adjacent entity that should be researched and (where applicable) issued legal
process. Status column: SUBPOENA = US/EU legal process applicable;
RESEARCH = OSINT only; EXCLUDED = no operator-link established.
| Entity | Jurisdiction | Why in scope | Status |
|---|---|---|---|
| Coinbase | US (Delaware) · listed | Notebook p.53 explicitly names C2 (Coinbase) as the routing exchange. Apex US-side subpoena target. | SUBPOENA |
| Tether (USDT issuer) | BVI / Hong Kong | Stable-value rail likely used between BTC/ETH inflow and AED/USD off-ramp. Tether complies with US legal-process for OFAC/freeze. | SUBPOENA |
| Circle (USDC issuer) | US | Alternative stable-value rail; US-domiciled. | SUBPOENA |
| Binance | Cayman / global | Common UAE crypto venue; second routing candidate after Coinbase. Subject to US DoJ DPA from 2023 — discloses to US legal process. | SUBPOENA |
| OKX | Seychelles / global | Strong UAE / GCC user base; potential alt-routing. | RESEARCH |
| Kraken (Payward Inc.) | US | US-domiciled exchange; subject to US legal process. | SUBPOENA |
| KuCoin | Seychelles | Common with Indian / GCC users; weaker disclosure track record. | RESEARCH |
| Bybit | UAE (DMCC) / Seychelles | UAE-licensed via DMCC. Disclosure path within UAE. | RESEARCH |
| BitOasis | UAE (Dubai VARA / Bahrain) | UAE-licensed crypto exchange (post-VARA 2023). Operator's Dubai presence makes this a plausible local on-ramp. | SUBPOENA (UAE) |
| Rain | Bahrain CB-licensed / UAE VARA | UAE / Bahrain-licensed crypto exchange. | RESEARCH |
| CoinW | Seychelles, UAE-targeting | UAE-targeting marketing. | RESEARCH |
| Razorpay | India (Bangalore) | If the Calicut call-centre routes any rupee/INR settlement, Razorpay is the dominant Indian payment gateway. | SUBPOENA (India) |
| MoonPay / Transak | UK / global | Fiat-on-ramp aggregators that exchanges integrate with — investor's first crypto purchase often via these. | RESEARCH |
| Coin | Chain / token | Public explorer for signature-number scan |
|---|---|---|
| ETH | Ethereum (native) | etherscan.io |
| BNB | BNB Chain (BEP-20) | bscscan.com |
| SOL | Solana (native) | solscan.io |
| XRP | XRP Ledger | xrpscan.com |
| ADA | Cardano | cardanoscan.io |
| DOGE | Dogecoin (native) | dogechain.info |
| AVAX | Avalanche C-Chain | snowtrace.io |
| TRX | Tron (TRC-20) | tronscan.org |
| LINK | Chainlink (ERC-20) | etherscan.io |
| DOT | Polkadot | polkadot.subscan.io |
| MATIC | Polygon | polygonscan.com |
| TON | The Open Network | tonviewer.com |
| BCH | Bitcoin Cash | blockchair.com/bitcoin-cash |
| UNI | Uniswap (ERC-20) | etherscan.io |
| LTC | Litecoin | blockchair.com/litecoin |
| ICP | Internet Computer | dashboard.internetcomputer.org |
| ETC | Ethereum Classic | blockscout.com/etc |
| FIL ✓ | Filecoin (selected) | filfox.info |
| ATOM ✓ | Cosmos Hub (selected) | mintscan.io |
| STX ✓ | Stacks (selected) | explorer.hiro.so |
| HBAR ✓ | Hedera (selected) | hashscan.io |
| KAS ✓ | Kaspa (selected) | explorer.kaspa.org |
| Tool | Type | Use case |
|---|---|---|
| Chainalysis Reactor | Paid | Cross-chain transaction tracing; address attribution; KYT |
| TRM Labs | Paid | Address risk scoring, exchange-cluster identification, sanctions screening |
| Arkham Intelligence | Freemium | Public attribution graph; entity-cluster visualisation |
| Etherscan + similar | Free | Per-chain transaction listing with USD-value annotations |
| OFAC SDN List | Free | Cross-check operator wallets against US sanctions list |
| OpenSea / Blur / LooksRare APIs | Free + auth | NFT trading history per wallet — page 66 of notebooks marks Blockchain → NFT axis as in-scope |
Analysiert(X) → ETH → C1 → Schau Währg X→Y → C2 (Coinbase) → Trader → AppleBlockchain → {NFT, Smart contracts, WEB3}
No wallet-address strings (no 0x..., no bc1...) are
present in either the digitised notebooks or any operator-controlled HTML. Any actual addresses
live on the seized R730 / Mac PC, in a separate physical ledger not yet captured, or in the
operator's Coinbase / Binance / etc. account dashboards which are recoverable only via legal process.
Ten distinct operator phones have been captured to date — sourced from operator-controlled
web pages, Facebook About sections, contact strips on Dilshad's profile page, and
WhatsApp wa.me/ redirects behind UAE-displayed phones. The table below records
each number, its claimed function, and an action checklist for live testing.
The numbers below are confirmed-on-WhatsApp candidates that an investigator can dial from a burner WhatsApp account (do not use a personal account) to capture profile photo, "last seen", auto-reply, and any business-account banner. Do not initiate conversation beyond a neutral greeting — preserves chain of custody and avoids operator-side detection that an investigation is active.
| # | Number | Country / network | Attributed surface | WhatsApp action |
|---|---|---|---|---|
| 1 | +971 50 146 6750 | UAE / Etisalat | Dilshad Muhammed personal (FB profile) | Screenshot profile photo + status + business-account marker |
| 2 | +971 52 622 3887 | UAE / du | Dilshad UAE alt (dhilshad-profile contact card) | Same — profile + status |
| 3 | +971 58 859 3159 | UAE / Virgin (5G) | Matajar Group main / Bizfuel / D Express / DCARS contact pages all list this | Screenshot — likely shared Matajar account |
| 4 | +971 56 333 5111 | UAE / du | Matajar WhatsApp main (wa.me/971563335111) | WhatsApp Business banner expected — confirm BUSINESS verification |
| 5 | +971 50 272 7891 | UAE / Etisalat | D Express direct number (matajar bizfuel page) | Screenshot |
| 6 | +971 50 216 4944 | UAE / Etisalat | DCARS direct (wa.me/+971502164944 — investment-program CTA) | HIGHEST PRIORITY — the public CTA for the Trade Mirage / DCARS investment funnel. Capture any auto-reply. |
| 7 | +971 4 266 1924 | UAE / Etisalat landline | Magnexa.ai office (Mon–Fri 9–6 GST) / Suite 110 Rawdat Al Wasl | Voice call only (not WhatsApp). Capture answer machine / receptionist. |
| 8 | +66 65 932 1129 | Thailand / TrueMove H | Bangkok Mag Nexa Co., Ltd. office (per dhilshad-profile) | WhatsApp screenshot — Thai number for a UAE-marketed group is unusual; profile may reveal Bangkok-side staff |
| 9 | +91 90 3781 2288 | India / Kerala (likely Calicut) | D Express customer-service WhatsApp behind UAE-displayed phone — directly evidences Calicut call-centre | CRITICAL — first contact with the call-centre operator. Truecaller cross-reference needed. |
| 10 | +91 84 5355 5000 | India / Kerala | GetLead CRM Calicut sales line | Truecaller cross-reference; capture WhatsApp Business banner |
For each number above, run Truecaller (Indian-side dominant) and
NumLookup / WhitePages / Sync.ME to get the
community-tagged caller name. The Indian numbers (+91) are most likely to return Truecaller
tags identifying the owning person or department. Save the screenshots into
case-archive/captures/whatsapp-truecaller/.
| Number | Carrier | Subpoena target (CDR + subscriber identity) |
|---|---|---|
| +971 50/52/56/58/4 — UAE | Etisalat / du / Virgin Mobile UAE | UAE TDRA-mediated request via Dubai Police / ADGM enforcement chain |
| +66 65 — Bangkok | TrueMove H | Thailand NBTC-mediated request via Royal Thai Police |
| +91 90 / +91 84 — Kerala | Reliance Jio / Airtel / Vi (Vodafone Idea) | India CERT-In / DoT-mediated request; warrants likely needed for CDR |
Tiered functional chart of the operation. Solid lines indicate confirmed relationships from operator-controlled documents; dotted lines indicate suspected relationships pending confirmation. Roles are inferred from documented evidence — the structure is consistent with a multi-vertical fraud-and-cover-business pyramid.
C2 (Coinbase) as routing exchange · Mirage Brokerage Co Egypt (EGX 1148) as licensed-broker layer82.25.106.182 hosts FIVE operator domains. Holds account-billing identity. Highest-value hosting subpoena.google-site-verification=c31Yi8... on momsandwivesid6740457644 (Indian store); D Express Android com.matajar.dexpress; Moms & Wives Android com.matajar.momsandwivesna5sraqmf6q0rw72rllo4dt2z2xe1m on dexpress.ai. Holds full ad-account billing + targeting + spend.Reading the chart: Tier 1 + Tier 2 are the named human perpetrators (high confidence). Tier 3 is the operational machinery. Tier 4 is the public-facing acquisition surface. Tier 5 is the jurisdictional cover (each shell is registered in a different country to fragment legal-process surface). Tier 6 is the victim base. Below that line: service-provider third parties who hold disclosure-grade records — these are the practical handles by which the operation is unwound.
Live DNS resolution captured 2026-05-05 via Google Public DNS (8.8.8.8). Full per-domain
output preserved at case-archive/captures/dns/full_dns.txt. The findings below
add several high-value subpoena targets that the operator's HTML alone did not expose.
82.25.106.182 = single-account multi-domain hostFIVE distinct operator domains all resolve to the same Hostinger IP:
| Domain | A record | Mail provider | DNS host |
|---|---|---|---|
trademirage.com | 82.25.106.182 | Outlook 365 + Hostinger backup MX | Hostinger DNS-Parking |
matajargroup.com | 82.25.106.182 | Outlook 365 | Wix DNS |
dexpress.ai | 82.25.106.182 | Outlook 365 + mlrcloud.com relay | GoDaddy |
dcars.ae | 82.25.106.182 | Outlook 365 | Hostinger DNS-Parking |
momsandwives.com | 51.112.131.103 * | Outlook 365 + mlrcloud.com relay | GoDaddy |
* momsandwives.com resolves to a different IP (51.112.131.103) but uses the same Outlook 365 tenancy + GoDaddy DNS pattern — likely a sister Hostinger account or a separate VPS.
Subpoena target: Hostinger International Limited (Lithuania, EU) — disclosure
of the customer account behind 82.25.106.182 would unlock the billing identity,
payment method, and full list of domains hosted on the account. This is the
single highest-value hosting subpoena in the case.
Each Outlook-hosted operator domain publishes a Microsoft tenant verification (MS=ms*)
TXT record. Microsoft holds the tenant identity for each token — subpoena unlocks the
Microsoft 365 corporate-tenant owner.
| Domain | Microsoft 365 tenant token |
|---|---|
| matajargroup.com | MS=ms22359510 |
| trademirage.com | MS=ms94471669 |
| dexpress.ai | MS=ms31891273 |
| dcars.ae | MS=ms44316426 |
| momsandwives.com | MS=ms20998229 |
| getleadcrm.com | MS=ms42540145 |
| Domain | Token / record | Disclosure target |
|---|---|---|
| dexpress.ai | facebook-domain-verification=na5sraqmf6q0rw72rllo4dt2z2xe1m | Meta Platforms — Business Manager account holder |
| momsandwives.com | google-site-verification=c31Yi8C5ZZHkGKEnSAjPjI6KaHXlSp_ukYVJzvc9K1Q | Google — Workspace / Search Console account holder |
| matajargroup.com | 1c92ebbe2556e7e01da070e9fd4c64c8 (TXT — purpose unknown) | Likely a Stripe / Razorpay / similar payment-gateway verification — needs identification |
Two TXT records on trademirage.com read literally as date strings in German
DD.MM.YYYY format:
<01.10.2025> = 1 October 2025 (a few weeks before the ADGM alert)<15.08.2025> = 15 August 2025These look like operator-side annotations — possibly deployment markers, DNS-rotation timestamps, or some custom verification scheme. Their German DD.MM format is stylistic evidence of a German-side editor (consistent with Dennis Poschner). They are not part of any standard DNS-record specification.
| Domain | A record | Hosted by |
|---|---|---|
etrade-miragebrokerage.net | 196.219.50.170 | LinkDataCenter (Egypt) / Link.net NS |
miragebrokerage.net | 192.254.132.232 | TE Data (Telecom Egypt) NS |
miragebrokerage.org | 192.254.132.232 | TE Data (same as .net) |
miragebrokerage.eg | 41.33.114.75 | Self-hosted; SPF includes spf.mail.miragebrokerage.eg |
The Egyptian-side cluster is hosted entirely on Egyptian ISP infrastructure (LinkDataCenter +
TE Data) and runs its own Egyptian-domiciled SPF mail server (spf.mail.miragebrokerage.eg).
Disclosure path is the Egyptian National Telecom Regulatory Authority (NTRA) and FRA.
A targeted scan was run for any web3-style DNS records — dnslink= (IPFS pointers),
_eth./_btc. CAA-style wallet-pointer records, ENS reverse records,
Unstoppable Domains hooks, and CryptoDomains TXT strings. No matches were found
across any of the 22 operator-controlled domains. The operator's DNS is web2-only.
The next research step on this track is reverse-WHOIS: feed each operator-attached email (consolidated list in §12.3) into ViewDNS / DomainTools / WhoXY reverse-WHOIS to enumerate every other domain the same email has registered. Likely candidates per email:
info@matajargroup.com → all matajar / mirage / mag-prefix domainsdilshadmd@matajargroup.com → personal-side registrationse36verdeck@gmail.com → Poschner-side German registrations (if any)salamk05@gmail.com → Ashik Salam personal domain historymohamedkamalrakha@gmail.com → Egyptian-side registrationsA reverse-WHOIS hit on any operator email may surface previously-unknown sister scam domains registered by the same parties — the operator pattern of churning brand surfaces every 2–3 years (CandyBay → Matajar → Dabbab Express) means there are likely older registrations not yet in our domain inventory.
The operator publishes 5 mobile apps (3 iOS + 2 Android) under
2 developer accounts. The Apple side is a personal-name account
("Muhammed Dilshad" ID 1786185813) — meaning Apple's
payment-method-on-file points directly at the natural person, not a corporate entity. The
Google Play side is a business-name account ("Moms and Wives") under which
both D Express and Moms & Wives Android apps are published.
The dexpress.ai homepage carries verbatim Lorem Ipsum placeholder text
("It is a long established fact that a reader will be distracted by the readable content of
a page when looking at its layout. The point of using Lorem Ipsum…"), duplicated on
Matajar Group's own /d-express/ subsidiary page. An operator running an
AED 6,000-entry investment platform with Lorem Ipsum in production is a strong signal of
outsourced (likely Calicut Coders Bunch) web development with no operator-side
copy review — and reinforces the picture that the actual sales funnel is the
WhatsApp call-centre, not the website.
| App | Platform | Bundle / ID | Developer (account name) | Notable |
|---|---|---|---|---|
| D Express | iOS (Indian App Store) | id6740457644 |
Muhammed Dilshad (Apple ID 1786185813) | 82.8 MB · 16 versions back to v1.1.0 (29 Apr 2025) · No ratings yet · Privacy policy hosted on AWS S3 dabbab-bucket (Bahrain me-central-1) |
| Moms & Wives | iOS (Indian App Store) | id6740058185 |
Muhammed Dilshad (Apple ID 1786185813) | 183 MB · 97 ratings · 3.6 stars · Developer responses signed info@momsandwives.com (NEW email) · Multiple OTP / "cannot update" complaints |
| DCars | iOS (Indian App Store) | id6751324576 |
Muhammed Dilshad (Apple ID 1786185813) | 69.5 MB · v1.2.0 (30 Oct 2025) · No ratings yet · Privacy policy at dcars.ae |
| D Express | Android (Google Play) | com.matajar.dexpress |
Moms and Wives (Play developer) | 1K+ downloads · Updated 24 Oct 2025 · "No data shared with third parties" (developer-declared) |
| Moms & Wives | Android (Google Play) | com.matajar.momsandwives |
Moms and Wives (Play developer) | 100K+ downloads · Teen content rating · Multiple screenshots |
dabbab-bucketThe D Express iOS privacy-policy URL revealed an operator-controlled AWS S3 bucket:
https://dabbab-bucket.s3.me-central-1.amazonaws.com/TermsAndConditions/PRIVACY-POLICY-Dexpress.docx
Region: me-central-1 = AWS Bahrain. The bucket-root request
returns "Access Denied" (listing restricted, normal AWS behaviour) but confirms the bucket
exists. This is a new infrastructure subpoena target: AWS will disclose the
account holder, billing card, region, and bucket-content listing under US legal process.
Other operator assets likely live in the same bucket (Terms / Privacy / Cookie policies /
app-asset images / promotional video files).
The mismatch matters because Apple's Section 230-style limited-liability protections do not transfer when the developer is a natural person. Any dispute / fraud complaint against the iOS apps targets Muhammed Dilshad personally — not Matajar Group, not Mirage by MAG, not Mag Nexa. This is operationally relevant for victim recovery and for jurisdictional purposes.
1786185813 (Muhammed Dilshad): full account, billing card, payment history, app submission history, internal review notesdabbab-bucket S3 bucket: account holder, full content listing, access logsMost operator domains are privacy-redacted in WHOIS (post-GDPR, this is standard for .com / .ai / .net), so the registrant identity is hidden in the public record and only recoverable via registrar-side legal-process disclosure. The registrar-by-domain breakdown below establishes which legal process applies to which domain.
| Domain | Registrar | DNS host | Web/A IP | Mail provider |
|---|---|---|---|---|
matajargroup.com |
Wix.com Ltd (US/IL) | Wix DNS | 82.25.106.182 (Hostinger LT) | Microsoft 365 |
trademirage.com |
GoDaddy (US) | Hostinger DNS-Parking | 82.25.106.182 (Hostinger LT) | Microsoft 365 + Hostinger backup |
dexpress.ai |
GoDaddy (US) | GoDaddy | 82.25.106.182 (Hostinger LT) | Microsoft 365 + mlrcloud.com |
dcars.ae |
(Hostinger DNS — UAE TLD registrar TBC) | Hostinger DNS-Parking | 82.25.106.182 (Hostinger LT) | Microsoft 365 |
momsandwives.com |
GoDaddy (US) | GoDaddy | 51.112.131.103 | Microsoft 365 + mlrcloud.com |
magnexa.ai |
GoDaddy (US) | GoDaddy | 142.93.223.193 (DigitalOcean) | (none captured) |
do-verify.com |
BigRock Solutions Ltd (Indian registrar) | Cloudflare | (Cloudflare-fronted) | (none captured) |
metricmotive.ai |
GoDaddy (per NS pattern) | GoDaddy + Cloudflare | (parked) | — |
etrade-miragebrokerage.net |
eNom, LLC (US — Tucows subsidiary) | Link.net (Egypt) | 196.219.50.170 (LinkDataCenter EG) | LinkDataCenter EG |
miragebrokerage.net / .org |
(eNom likely — to confirm) | TE Data (Telecom Egypt) | 192.254.132.232 (shared) | self-hosted |
matajar.ae |
AEserver | AEserver | 212.95.51.38 (AEserver UAE) | self-hosted + MailChannels |
getleadcrm.com |
(GoDaddy or similar) | Cloudflare | (Cloudflare-fronted) | Microsoft 365 |
e36-verdeck.de |
(German DENIC registrar — TBC) | (DNS dead) | (DNS dead) | — |
wholzale.com |
(GoDaddy likely — TBC) | (DNS dead) | (DNS dead) | — |
baqalat.express |
(.express TLD via Donuts / Identity Digital) | (DNS dead) | (DNS dead) | — |
.com and .ai domains: trademirage, dexpress.ai, momsandwives, magnexa.ai. Single subpoena under US legal process unlocks 4+ registrant identities.82.25.106.182. Single subpoena unlocks the hosting account-billing identity.dilshadmd@matajargroup.com, info@matajargroup.com, etc.| Listing name | TRADE MIRAGE INVESTMENT |
|---|---|
| Rating | 4.6 stars (with real customer reviews — number not yet captured) |
| Category (significant) | Business development service — NOT "investment firm" / "trading platform" / "broker", which would draw regulator attention |
| Address | Matajar E Commerce Back office, 25 34 St — Sheikh Zayed Collector Rd — Port Saeed — Dubai — United Arab Emirates |
| Plus Code | 57V6+JF Dubai |
| Hours | Mon–Fri 9 AM – 5 PM (closed weekends) |
| Phone | +971 4 266 5518 (NEW operator landline — distinct from the +971 4 266 1924 Magnexa office line) |
| Website | trademirage.com |
The category "Business development service" is operationally telling: it is the most common UAE Google Business Profile category for entities that don't want their Maps listing to surface in regulator / consumer-protection searches for "trading platform" or "investment". The 4.6-star rating implies real reviewers — these reviewer profiles are victim-witness candidates.
| Listing name | Matajar Group |
|---|---|
| Rating | 4.6 stars |
| Category | Corporate office |
| Status (notable) | "Temporarily closed" — Google Maps marker |
| Address | Sheikh Zayed Collector Rd — Al Wasl — Dubai (Plus Code 57V6+JF — same plus code as Trade Mirage Investment, i.e. same building / same area) |
| Phone | +971 56 333 5111 (the Matajar WhatsApp) |
| Website | matajargroup.com |
Both listings share Plus Code 57V6+JF Dubai — they are in the same building area on Sheikh Zayed Collector Rd. The "Temporarily closed" annotation on Matajar Group is worth tracking; it may be Google-applied (algorithmic closure based on absent verifications) or self-applied (operator marked it closed).
Independently of Google, 2GIS (UAE business directory) lists Matajar Group at
"Rawdat Al Wasl Building, 206, Sheikh Zayed Road, 1st Floor, Office 1103, Al Wasl Jumeirah,
Dubai" with phone +971 4 337 1027 (NEW landline). Listing ID
70000001100738456. The 2GIS address differs from the Google Business address —
they may be the same building unit numbered differently, or a separate office in the same area.
Adding the two newly discovered landlines, the operator's phone footprint is now twelve distinct numbers:
| # | Number | Type | Attribution | Source |
|---|---|---|---|---|
| 1 | +971 50 146 6750 | UAE mobile (Etisalat) | Dilshad personal | Facebook About |
| 2 | +971 52 622 3887 | UAE mobile (du) | Dilshad UAE alt | dhilshad-profile contact |
| 3 | +971 58 859 3159 | UAE mobile (Virgin) | Matajar main | matajargroup.com / multiple subsidiary pages |
| 4 | +971 56 333 5111 | UAE mobile (du) | Matajar WhatsApp | contact-us page + Google Maps |
| 5 | +971 50 272 7891 | UAE mobile (Etisalat) | D Express | D Express direct |
| 6 | +971 50 216 4944 | UAE mobile (Etisalat) | DCARS / investment funnel | dcars.ae/investments wa.me |
| 7 | +971 4 266 1924 | UAE landline | Magnexa.ai office | magnexa.ai/contact |
| 8 | +971 4 266 5518 | UAE landline (NEW) | TRADE MIRAGE INVESTMENT GMB | Google Maps profile |
| 9 | +971 4 337 1027 | UAE landline (NEW) | Matajar Group 2GIS | 2GIS Dubai listing |
| 10 | +66 65 932 1129 | Thailand mobile | Bangkok Mag Nexa | dhilshad-profile |
| 11 | +91 90 3781 2288 | India mobile (Kerala) | D Express WhatsApp / Calicut call-centre | D Express contact wa.me |
| 12 | +91 84 5355 5000 | India mobile (Kerala) | GetLead CRM Calicut sales | getleadcrm.com |
The three UAE landlines (+971 4 266 1924, +971 4 266
5518, +971 4 337 1027) all share the prefix +971 4 = Dubai
area code. The two +971 4 266 numbers are sequential within Etisalat's Dubai
block — likely two PBX extensions on the same physical office line. The 2GIS landline
+971 4 337 1027 is on a different exchange and may correspond to a different
tenant block or earlier office.
Adding info@momsandwives.com (newly surfaced from Apple's Moms & Wives developer-response
thread), the operator's email footprint now totals eleven distinct addresses:
info@matajargroup.com — general matajargroupdilshadmd@matajargroup.com — Dilshad corporatedhilshad@matajar.ae — Dilshad personal (matajar.ae MX active)info@magnexa.com — claimed but mislabelled (magnexa.com is third-party Italian)partnerships@magnexa.com — sameinfo@momsandwives.com — NEW (Apple developer-response signature)salamk05@gmail.com — Ashik Salam personal Gmail (leak)e36verdeck@gmail.com — Poschner covermohamedkamalrakha@gmail.com — Egyptian adminmiragebrokerage2@gmail.com — Egyptian opsonlinerequest@miragebrokerage.net — Egyptian corporateThree operator brands all categorise themselves under non-financial social-platform categories — a deliberate pattern to avoid surfacing in regulator / consumer-protection search.
| Brand | Platform | Self-declared category | What it actually does |
|---|---|---|---|
| Matajar Group | Facebook Page | Food & beverage | Multi-vertical holding inc. forex/commodity trading, "investment platforms" |
| Moms & Wives | Facebook Page | Social service | MLM-recruitment "skill registration" platform with fee structure |
| TRADE MIRAGE INVESTMENT | Google Business Profile | Business development service | Forex / 6-coin algorithmic trading bot — ADGM-flagged fraud |
| Dilshad personal | Facebook profile | Entrepreneur | (matches public corporate role) |
Each non-financial category is a deliberate choice. Search a regulator's Google for "Dubai forex trading platform" and Trade Mirage Investment's "Business development service" GMB profile won't surface; search "Dubai social services" and you'll see Moms & Wives. The pattern is consistent with a category-laundering posture — present the same business under whichever non-financial category each platform makes available.
The phone +971 50 272 7891 appears as the customer-service contact on
both the D Express website AND the Moms & Wives Facebook Page. One operator
number serves two distinct branded customer-service surfaces — confirmed via the user-supplied
Facebook screenshot dated 2026-05-05. This is a strong indication that the front-line
call-centre answers calls under whichever brand the caller asks for, rather than running
separate teams per brand.
The Moms & Wives Facebook Page Contact info section displays
moms_nd_wives + 3 next to the email/IG line — Facebook's "+ N" indicator means
3 additional contact handles are stored on the Page but only revealed when
a visitor expands the field. Each + N field on every operator FB Page should be expanded
with a screenshot. Per the user's screenshot, those fields likely include:
@moms_nd_wives (already known — also operates D Express's Instagram per archive 13)info.matajargroup@gmail.com
Matajar Group's Facebook About page lists info.matajargroup@gmail.com
as the email contact — distinct from the corporate info@matajargroup.com. This is
the "humble-beginnings Gmail" variant — the operator-side personal Gmail used
before the corporate Microsoft 365 tenancy was provisioned. Pattern: {prefix}.{brand}@gmail.com.
Worth searching against HIBP / Dehashed / IntelX directly.
Updated email-address inventory now totals 12 distinct addresses. The
info.matajargroup@gmail.com entry replaces the previous "Item 6 — info@momsandwives.com"
slot and adds: info.matajargroup@gmail.com as a new candidate for reverse-WHOIS
enumeration of the operator's domain registrations.
Divergence Systems should walk through each operator-controlled Facebook Page in the Facebook mobile app from a burner account and screenshot the following sections per Page:
Pages to walk:
facebook.com/Matajargroupfacebook.com/momsandwivesfacebook.com/dexpress.dabbab (or whatever the D Express Page slug is — check via Facebook search)facebook.com/dcars.ae (or DCars slug)facebook.com/bizfuelfacebook.com/MagNexafacebook.com/mirage.by.magfacebook.com/dhilshadmatajar (Dilshad personal)facebook.com/dennis.poschner (Poschner personal — Germany-side)facebook.com/miragebrokerage11 (Egyptian arm)Facebook's Page Transparency section is one of the few pieces of Page metadata that cannot be retroactively rewritten by the Page admin — it's Meta-controlled. Specifically:
Across 2026-05-05 (141 days post-ADGM/FSRA fraud alert), the operator's parent corporate site
matajargroup.com publishes five stand-alone exhibits that
independently establish unlicensed financial-services solicitation, knowing facilitation of a
regulator-flagged brand, multi-jurisdictional unlicensed investment claims, Ponzi grammar, and
asset-class-incompatibility commingling fraud. Each exhibit below is verbatim from the live
site2122.
Source URL: matajargroup.com (homepage About-Us, also Investment + History pages)
"At Matajar Group, our mission is to lead with innovation, integrity, and customer focus across every sector we serve. From building trusted investment platforms in forex and commodities, to delivering seamless eCommerce experiences and redefining automotive access through rental and lease solutions..."
The phrase "trusted investment platforms in forex and commodities" is a public-facing self-attestation that Matajar Group operates forex/commodity trading platforms. Cross-search of SCA + DFSA + FSRA registers confirms no UAE financial-services license for Matajar Group, Mirage by MAG, or Trade Mirage. The mission paragraph is direct evidence of unlicensed financial-services solicitation under UAE Federal Law (SCA Decision No (1/R) of 2019).
Source URL: matajargroup.com/services — Golden Membership Card section
"The Golden Membership Card is Matajar Group's premium loyalty and subscription program... Whether you're shopping on Dexpress, renting a car through Dcars, managing van sales with BizFuel, or investing through Mirage..."
The parent corporate site explicitly cross-sells "investing through Mirage" as a vertical of a loyalty program — post-ADGM-alert and post-FSRA-alert. This places the regulator-flagged Mirage brand at the apex of a Matajar Group customer-journey funnel. Even if Mirage by MAG Investment LLC is argued as a separate legal entity, the parent-company cross-sell creates direct knowing facilitation of the unlicensed Mirage investment offering.
Source URL: matajargroup.com/mag-nexa — full pitch section
"MAG NEXA presents a compelling investment opportunity for forward-thinking high-net-worth individuals... With a minimum entry of $25,000 USD, investors gain access to a structured monthly return of 4% equivalent to 48% per annum paid directly from live operating cash flow across three revenue-generating verticals."
"Unlike speculative investments, MAG NEXA is anchored by real, appreciating assets — from premium retreat operations and curated holiday homes to a flagship luxury resort development in Thailand. Your capital doesn't sit idle; it powers a self-sustaining ecosystem that grows with every client acquired, every stay booked, and every property added to the portfolio."
"Investors also enjoy exclusive lifestyle privileges including complimentary and discounted retreat access, priority booking across the full Nexa network, and invitations to private investor summits. With a clear 36-month buildout roadmap and multiple exit pathways including equity conversion, resort asset sale, and global franchise scaling..."
This paragraph is textbook unauthorised investment-services solicitation across multiple jurisdictions:
Three new sub-brands surfaced from this pitch: ZEN Escape retreats, Nexa Sanctuary resort, Nexa Stay holiday homes.
Within Exhibit C, one phrase warrants standalone treatment as a regulator exhibit:
"Your capital doesn't sit idle; it powers a self-sustaining ecosystem that grows with every client acquired, every stay booked, and every property added to the portfolio."
The phrase "grows with every client acquired" describes returns as a function of new client acquisition rather than asset performance. This is the textbook Ponzi grammar — investor returns are funded by new investor inflows, not by the underlying claimed asset's cash generation. Under SEC v. Howey Co. (1946) and equivalent UAE / Egyptian / Indian securities-fraud jurisprudence, this language alone is sufficient to characterise the offering as an unregistered securities-fraud scheme.
Source URL: matajargroup.com — Investment page (logistics + delivery van + property stacked at AED 100,000)
These are three completely incompatible asset classes presented as the same investment at the same minimum entry. A regulator's read: investor money is pooled into an undefined product and labelled whichever asset class will close the prospect. Commingling-grade fraud — investors don't know what they're actually buying. Under UAE Federal Decree-Law No. (20) of 2018 (AML/CFT Law), pooling investor funds under misrepresented asset classes triggers AML reporting requirements that have not been met.
| # | Product | Stated yield / entry | Asset class claimed |
|---|---|---|---|
| 1 | D Express subscription | 5%/month, AED 6,000 | Grocery loyalty (cash withdrawal) |
| 2 | Logistics Investment | 4-6%/month, AED 100,000 | E-commerce logistics |
| 3 | "Invest in Delivery Van" | (same AED 100K block) | Specific physical vehicle stake |
| 4 | "Invest in Property with Matajar" | UPTO 35%, AED 100K | Real estate |
| 5 | DCARS fleet | Monthly OR quarterly profit-share | Vehicle fleet |
| 6 | MAG NEXA "Wellness Meets Wealth" | 4%/month = 48% annual, $25K USD | Wellness retreats + Thailand resort |
| 7 | "Investing through Mirage" cross-sell | (unstated) | Mirage forex/crypto |
| 8 | Trade Mirage forex bot | 12%/month | Algorithmic crypto |
| 9 | "Boost Your Online Sales" service | (service fee) | E-commerce SaaS |
No legitimate operator simultaneously publishes nine yield-promise products spanning seven incompatible asset classes. The combinatorial pattern itself is operational signature.
The operator's signature tactic is one-letter / namespace shadowing of legitimate UAE/regional entities. Four instances are now documented21.
| # | Operator brand | Real legitimate entity being shadowed | Discovery source |
|---|---|---|---|
| 1 | Matajar (with -ar) | Sharjah Holdings "Matajer" (with -er) — 2012 Sharjah-government-adjacent retail brand | Behance, Feb 4, 2012: "Matajer is the new project for Sharjah Holdings to offer a close-proximity retail destination" |
| 2 | Mirage by MAG Investment LLC (UAE, since 2010) | Mirage Holding Company (Egyptian umbrella, since 2006) + Egyptian Mirage Brokerage Co (EGX member 1148) | Twitter @BrokerageMirage bio + matajargroup About-Us "Operating License Mirage by MAG Investment LLC since 2010" |
| 3 | MAG NEXA | Real NEXA Bali developer (nexauniverse.com, 15 completed Bali projects, "Alexander" founder) |
MAG NEXA pitch lists "Bali" as one of its claimed geographies |
| 4 | "Bintaryam" (operator alias / LAN hostname) | Taryam Omran Investments (Sharjah, Suites 1401/1402 Al Hind Tower, toh.ae) |
Operator alias = Arabic bin Taryam (= "son of Taryam") shadowing a real Sharjah investment-house surname |
Plus a fifth potential instance: AZ MIRAGE BROKERAGE COMPANY (Arizona LLC file 02365995, since 1991) is at the same Tempe AZ address that the Egyptian Mirage Brokerage Co self-attests as their US presence — a transatlantic brand-shadow.
The four-plus instances are not coincidence. Brand-shadowing of a legitimate entity within the same regulatory market is an operational pattern: investor due-diligence searches return real results that the investor mis-attributes to the operator's brand. The operator builds credibility off the borrowed reputation without the licensing or asset base that actually backs the legitimate entity.
| Developer name | Muhammed Dilshad (personal-name account) |
|---|---|
| Developer ID | 1786185813 |
| Apple regional registration | Indian App Store (apps surface on apps.apple.com/in/...) |
3 iOS apps under this developer account:
| App | iTunes ID | Size | Versions | Ratings |
|---|---|---|---|---|
| D Express | id6740457644 | 82.8 MB | 16 versions back to 29 Apr 2025 | No ratings yet |
| Moms & Wives | id6740058185 | 183 MB | — | 97 ratings / 3.6 stars with multiple OTP/login bug complaints; developer responses signed info@momsandwives.com |
| DCars | id6751324576 | 69.5 MB | v1.2.0 30 Oct 2025 | No ratings |
| Developer name | "Moms and Wives" (business-name account) |
|---|
com.matajar.dexpress — 1K+ downloadscom.matajar.momsandwives — 100K+ downloads| Bucket | dabbab-bucket.s3.me-central-1.amazonaws.com |
|---|---|
| Region | me-central-1 (Bahrain) |
| Hosted content | D Express iOS privacy policy |
| Bucket-root | Returns Access Denied (listing restricted) |
| Subpoena target | AWS Inc. for account holder + bucket contents |
Apple's payment-method-on-file points directly at Muhammed Dilshad personally, not Matajar Group / Mirage by MAG. Any victim-side Apple-channel dispute or fraud complaint targets Dilshad as the personal natural-person developer. This is a direct natural-person liability handle distinct from the corporate-shell layer — and a clean subpoena target via Apple Inc. (Cupertino, CA) for billing identity, payment methods, refund history, and login IPs.
| # | Number | Type | Attribution | WhatsApp status |
|---|---|---|---|---|
| 1 | +971 50 146 6750 | Mobile (Etisalat) | Dilshad personal (FB profile) | (untested) |
| 2 | +971 52 622 3887 | Mobile (du) | Dilshad UAE alt | (untested) |
| 3 | +971 58 859 3159 | Mobile (Virgin) | Matajar main / Dilshad-tier | ON WhatsApp — investigator-confirmed reaches "someone key" |
| 4 | +971 56 333 5111 | Mobile (du) | Matajar WhatsApp main | ON WhatsApp (publicly listed as wa.me/971563335111) |
| 5 | +971 50 272 7891 | Mobile (Etisalat) | D Express + Moms & Wives shared customer-service | ON WhatsApp |
| 6 | +971 50 216 4944 | Mobile (Etisalat) | DCARS investment funnel | ON WhatsApp |
| 7 | +971 4 266 1924 | Landline | Magnexa.ai office | (landline) |
| 8 | +971 4 266 5518 | Landline | Trade Mirage Investment GMB | (landline) |
| 9 | +971 4 337 1027 | Landline | Matajar Group 2GIS | (landline) |
| 10 | +971 54 997 8780 | Mobile (du) | Trade Mirage HR poster | NOT on WhatsApp — investigator-confirmed deactivated |
| 11 | +66 65 932 1129 | Bangkok mobile | Mag Nexa Bangkok office | (untested) |
| 12 | +91 90 3781 2288 | India mobile (Kerala) | D Express call-centre WhatsApp behind UAE-displayed phone | ON WhatsApp |
| 13 | +91 84 5355 5000 | India mobile (Kerala) | GetLead CRM Calicut | ON WhatsApp |
| 14 | (malformed) +97156335111 | Listed on website | Either typo or non-routing | — |
The 2026-05-05 investigator-led WhatsApp test sweep revealed a selective-scrub pattern — the operator has wiped WhatsApp accounts on regulator-flagged-brand numbers while keeping live the ones that funnel to leadership:
+971 58 859 3159, Matajar +971 56 333 5111, D Express +971 50 272 7891, DCARS +971 50 216 4944, Calicut +91 90 3781 2288 and +91 84 5355 5000+971 54 997 8780
Trade Mirage HR is voice/SMS-only by design. When a regulator dials the number printed on the
Trade Mirage hiring poster, they hit "not on WhatsApp" and the trail looks dead. Meanwhile the
actual leadership funnel routes through +971 58 859 3159 which doesn't carry the
Mirage brand string and isn't on the regulator's radar. This is operational
counter-intelligence behaviour consistent with someone who has already responded to a
regulator alert by silently triaging which channels to keep open.
Adding three NEW emails surfaced from this batch (humble-beginnings Gmails + Trade Mirage HR Gmail + Play Store-leaked address):
| # | Tier | Source | |
|---|---|---|---|
| 1 | info@matajargroup.com | Corporate general | matajargroup.com contact |
| 2 | dilshadmd@matajargroup.com | Dilshad corporate | matajargroup contact (MD = Muhammed Dhilshad initials) |
| 3 | dhilshad@matajar.ae | Dilshad personal (matajar.ae MX active despite domain parked) | matajar.ae DNS |
| 4 | info.matajargroup@gmail.com | NEW — humble-beginnings personal Gmail | Matajargroup FB Contact info |
| 5 | hr.trademirage@gmail.com | NEW — Trade Mirage HR Gmail | Trade Mirage hiring poster |
| 6 | info@momsandwives.com | Moms & Wives corporate | Apple App Store developer responses |
| 7 | es.matajar@gmail.com | NEW — purpose unknown | Play Store Moms&Wives + D Express captures |
| 8 | salamk05@gmail.com | Ashik Salam personal (Product Manager) — leaked via dexpress.ai contact-page malformed href | dexpress.ai HTML |
| 9 | e36verdeck@gmail.com | Dennis Poschner cover business | e36-verdeck.de |
| 10 | mohamedkamalrakha@gmail.com | Egyptian Mirage Brokerage admin | EGX member registry |
| 11 | miragebrokerage2@gmail.com | Egyptian operations | Egyptian Mirage Brokerage social |
| 12 | onlinerequest@miragebrokerage.net | Egyptian corporate | miragebrokerage.net |
Three of the twelve are Gmail addresses (humble-beginnings pattern): the operator's pre-corporate mail used before the Microsoft 365 tenant was provisioned. These are the highest-yield targets for HIBP / Dehashed / IntelX (paid-tier) breach-database lookups — a single breach hit ties the email to a real device, a real IP, a real registration trail across years of the operator's history.
Triangulating across captured material, the operator runs a fraud psychology that is sophisticated at brand churn and affinity marketing, but unsophisticated at digital infrastructure. Eight signals collected:
dexpress.ai homepage AND matajargroup.com/d-express/ AND console.do-verify.com "coming soon"17. Lorem Ipsum on a live commerce surface signals neither QA nor pre-launch review.+97156335111 published with 8 digits (invalid UAE format) on contact-us page — typo on the operator's own corporate website, never QA'd.The operator did not outsmart anyone. They out-volumed scrutiny by churning brands every 2-3 years and spreading exposure across enough jurisdictions that no single regulator sees the whole picture. The infrastructure unsophistication actually aids the case: it confirms the absence of any underlying technical operation matching the "algorithmic trading bot" / "AI investment platform" claims.
The 24 April 2025 Matajargroup.com Facebook birthday post titled "Happy Birthday Visionary CEO MUHAMMAD DHILSHAD" provides the first attached-to-his-name photograph of the operator. Image shows beard, brown jacket, tan shirt, dark hair21.
Two named likers of the post — Jasna Shabeer + Sofiya Sofiya — are inner-circle candidates worth running through LinkedIn / FB / IG for relationship to operator (likely relatives or close associates).
| Channel | youtube.com/@Momsandwives |
|---|---|
| Subscribers | 11,000 (per user-supplied screenshot) |
| Videos (channel-listed) | 108 |
| Videos captured by yt-dlp | 206 (including Shorts playlist) |
| Total descriptions captured | 305 |
| English VTT subtitles captured | 63 |
| English-orig VTT captured | 59 |
| Malayalam VTT captured | 4 |
rjfazlu3144) + RJ Vysakh — featured commentators (Malayalam radio personalities)The "MEGA APP LAUNCH" playlist on the channel contains 54 videos documenting the Moms & Wives app launch event. Likely speaker / panel / demo recordings — each title reveals additional named operator-affiliated personalities. Transcript-analysis run over the en / en-orig / ml subtitle tracks is a one-shot speaker-inventory mining opportunity that closes the inner-circle attribution gap for the case.
The India trail is broader and older than the UAE trail22. Calicut (Kozhikode), Kerala is the operator's talent / call-centre / CRM / influencer / analytics origin. The UAE-side branding is the public face; Calicut is where the operation is actually run.
| Surface | Calicut connection |
|---|---|
| Dilshad's personal origin | Born Calicut / Kerala; primary social network is Malayalam-speaking diaspora |
| GetLead CRM | getleadcrm.com registered Calicut; +91 84 5355 5000 Calicut sales line |
| Coders Bunch | "Mag Nexa Bangkok + Calicut" claim — listed as in-house dev shop |
| Metric Motive | Calicut-registered tech contractor (domain parked) |
| Getlead Analytics Pvt Ltd | Indian MCA-registered private limited; CRM operations |
| @Momsandwives YouTube | Malayalam-language host; RJ Fazlu + RJ Vysakh = Malayalam radio personalities |
| Dubai Vartha 17 May 2021 | Malayalam-language UAE news channel paid-feature for wholzale.com |
+91 90 3781 2288 | India mobile (Kerala) D Express WhatsApp behind UAE-displayed phone |
+91 84 5355 5000 | India mobile (Kerala) GetLead CRM Calicut |
| Apple App Store | Apps registered under Indian regional store ("Muhammed Dilshad" personal-name developer ID 1786185813) |
Indian Ministry of Corporate Affairs (MCA) public register search should surface:
The directors' AAdhaar / PAN cross-references will tie Indian-side operations to the natural persons. Typical Indian Pvt Ltd has 2 directors minimum — those names are the second tier of operator natural-person attribution beyond Dilshad himself.
If any Kerala-resident victim has filed a cyber-crime complaint against Mirage by MAG / Matajar Group / D Express / Moms & Wives, the operator is on a Kerala police register. Direct outreach to Kerala SP-level cyber-crime through Indian Embassy Abu Dhabi → Kerala Embassy Dubai → state-police liaison is the access route.
User-supplied Facebook Reel from Matajargroup.com confirms a paid promotional feature on
Dubai Vartha (ദുബായ് വാർത്ത = "Dubai News"), a Malayalam-language UAE news
channel targeting Kerala-diaspora audience. Aired in the "Night Updates" segment
dated 17 May 2021, promoting www.wholzale.com.
Dubai Vartha holds records of every paid promotional feature: contract, payment, invoice, contact person. Disclosure target for the Kerala-diaspora-affinity-fraud track — this anchors a 2021 operator spend to a specific named individual on the operator side.
The operator publishes at least six distinct Dubai addresses across different surfaces21:
| Address | Source |
|---|---|
| Suite 110 / 1103 Rawdat Al Wasl, Near Business Bay Metro | matajargroup.com contact-us / about-us |
| Port Saeed, Centurion Tower, Block B, Suite 1103 | Matajar Online UAE LinkedIn page |
| Rawdat Al Wasl Building 206, Sheikh Zayed Rd, Office 1103 | 2GIS Dubai |
| Matajar E Commerce Back office, 25 34 St, Port Saeed | Trade Mirage Investment GMB |
| Sheikh Zayed Road, Dubai (HR posters) | Trade Mirage + Matajar Group hiring posters |
| Business Bay, Dubai | Matajargroup.com Facebook Page |
Either the operator runs across multiple physical premises OR the same physical building is described differently across surfaces. Both interpretations are operationally significant — multiple addresses fragment regulator-search surface; identical-building-with-different-labels signals deliberate misdirection.
The two Google Business Profiles (Trade Mirage Investment + Matajar Group) share Plus Code 57V6+JF Dubai — same building. Matajar Group is marked "Temporarily closed" on Google Maps, while Trade Mirage Investment is operational with a 4.6-star rating and a category of "Business development service" (a regulator-search-dodge category).
Operator brand strings cross-searched across ENS, Unstoppable Domains, Lens Protocol, Farcaster, OpenSea, Etherscan, Arkham Intelligence22. Zero matches for any operator-attributable wallet, label, or entity.
| Registry | Result |
|---|---|
| ENS | None of matajar.eth, mirage.eth, trademirage.eth, magnexa.eth, dexpress.eth, dcars.eth, bizfuel.eth, momsandwives.eth, dilshad.eth, poschner.eth, etc. registered to operator-attributable wallet |
| Unstoppable Domains | Same 12 strings × .crypto / .nft / .x / .wallet / .bitcoin / .dao / .888 / .zil / .blockchain / .polygon — no matches |
| Lens Protocol | @matajar.lens, @mirage.lens, @dilshad.lens, etc. — no matches |
| Farcaster | @matajar, @mirage, @dilshad, etc. — no matches (only unrelated handles) |
| OpenSea | Brand-string collection search — only unrelated NFT projects ("Mirage" gaming PoE, MAG NEXA unrelated artist) |
| Etherscan / Arkham | Brand-string label / entity search — no operator-attributable matches |
The operator runs in 2024-2026 with a pre-2018 web2-only mental model. They did not register the obvious brand strings as ENS / Unstoppable / Lens / Farcaster handles before launching. Combined with the in-page HTML scan (archive 18) — zero on-chain wallet addresses in any operator HTML, zero MetaMask / WalletConnect / RainbowKit / web3modal / wagmi / viem provider integration anywhere across the operator's WordPress estate — the operator's "crypto investment platform" claim is purely promotional. There is no underlying on-chain operation to trace.
The 5-tier yield ladder (5%-12% monthly across 6 coins) lifted from trademirage.com
is delivered without any on-chain wiring. There is no smart contract to audit, no transparent
ROI source, no on-chain trade flow. The "algorithmic trading bot for BTC/ETH/SOL/XRP/DOGE/ADA"
claim is a verbal pitch backed by a dashboard (mirage11.aiappz.com) with
no client-side web3 connection — the "trades" are server-side ledger entries
displayed to investors as if they were real. Investor capital flows IN via fiat (UAE bank,
card, AED-stable exchange) and is presented to investor via a server-rendered dashboard
showing fictitious returns. Withdrawal requests trigger an escalating "fee" sequence intended
to either (a) extract additional capital under the guise of release fees, or (b) delay
withdrawal until the investor gives up.
The on-chain audit confirms there is no public-web on-chain track. The traceable on-chain evidence necessarily resides in:
| Target | What to ask | Why |
|---|---|---|
| Coinbase Inc. (San Francisco) | KYC-tied account for Muhammed Dilshad / Mirage by MAG Investment LLC / Matajar Group Ltd / Mirage Brokerage Co (Egypt) / Mirage Brokerage AZ LLC | Notebook p.53 names Coinbase; primary suspected exchange |
| Binance Holdings Ltd / Binance.AE | Same KYC-tied account search | Largest UAE crypto on-ramp |
| Apple Inc. | Developer ID 1786185813 ("Muhammed Dilshad") billing identity, payment method, refund history, login IPs | Direct natural-person liability handle |
| Alphabet Inc. (Google Play) | "Moms and Wives" Play Console developer billing identity | Same as above for Android |
| Amazon Web Services | dabbab-bucket S3 bucket account holder + bucket contents |
Bahrain-region infra subpoena |
| Microsoft Inc. | Microsoft 365 tenant for matajargroup.com (token MS=ms83057961) — admin identity, MFA history, audit logs |
Tenant admin = leadership identity |
| Meta Platforms Inc. | Page admin lists + ad-account billing identity for Matajargroup, Mirage by Mag, Moms & Wives, Dilshad personal | Cross-jurisdictional admin location reveals collaboration |
| Hostinger International Ltd | Domain registrant identity for operator-domain bundle (matajargroup.com etc.) | Per archive 19 capture |
| YouTube (Alphabet) | Channel ownership + monetisation identity for @Momsandwives + @Dhilshadthoughts | Calicut-side spend evidence |
| Indian MCA | Coders Bunch + Metric Motive + Getlead Analytics Pvt Ltd director records | Indian-side natural-person attribution |
| Kerala State Police (cyber-crime cell) | Existing victim complaints against Mirage by MAG / Matajar Group / D Express / Moms & Wives | Pre-existing complaint register |
| Dubai Vartha | 17 May 2021 paid-feature contract / payment / contact person for Wholzale segment | 2021 operator-spend anchor |
| Egyptian FRA (Financial Regulatory Authority) | Mirage Holding Company + Mirage Brokerage Co (EGX member 1148) license records, ownership chain | Egyptian-side regulatory attestation cross-check |
| Arizona Corporation Commission | AZ MIRAGE BROKERAGE COMPANY (file 02365995) + Anthony Maggio + linked entities | Arizona-side filing chain |
Each subpoena should request: account-holder identity (legal name, registered ID type + number, registration date) · payment-method history (cards, bank accounts, wire instructions) · login history (IPs, device fingerprints, geolocation, timestamps last 24 months) · communication content where applicable · MFA recovery contacts (alternate email + phone — surfaces operator's actual reach identity).
| Element | Status | Source |
|---|---|---|
| Regulator-flagged fraud entity | Confirmed | ADGM/FSRA alert 2025-12-04 (archive 1) |
| Operator natural-person identity | Multi-source | Dhilshad personal profiles, Apple Developer ID, FB birthday post (archives 8, 16, 18, 21) |
| Co-operator (Germany side) | Identified | Dennis Poschner, e36-verdeck cover (archives 3, 18) |
| Multi-brand fraud network | Mapped | 9 brands, 4 brand-shadows, 5 tech-arm labels (archives 7, 13, 17, 21) |
| Self-incrimination exhibits | 5 exhibits captured | matajargroup.com live as of 2026-05-05 (archive 21, 22) |
| Multi-jurisdictional structure | Mapped | UAE + Egypt + Arizona + Calicut + Bangkok + Germany (archives 7, 12, 13, 18, 22) |
| Withdrawal-trap fraud model | Confirmed | Zorya review + ADGM alert + 9-product yield-incompatibility (archives 5, 17, 21) |
| Selective-WhatsApp scrub | Investigator-confirmed | Phone test sweep 2026-05-05 (archive 21) |
| On-chain attribution | Subpoena-only | Coinbase + Binance subpoena required (archive 22) |
| Internal pitch material | Imaging-only | R730 + Mac PC forensic imaging required (archives 21, 22) |
| Victim testimony | ⏳ Pending | "57 Investigations Ltd" channel via Zorya Capital (archive 5) |
The case is now regulator-hand-off-ready on the documentary side. The five
matajargroup.com self-incrimination exhibits alone are sufficient to compel
ADGM/FSRA + SCA + DFSA + FRA (Egypt) + SEC (Egypt) + AZCC + RBI + ED (India) + BaFin
(Germany) coordinated action. The forensic imaging + subpoena chain converts the
documentary case into a traced-money case.
Open-web research has plateaued on operator-side document discovery. The next inflection is hardware imaging.
Open-web and passive-signals research has reached its natural plateau. The documentary case is regulator-hand-off-ready as of 2026-05-07. What follows is an honest accounting of exhausted approaches, paused threads awaiting resource decisions, and a four-step roadmap to the next evidentiary inflection point.
The approaches below have been worked to exhaustion. Further investment in the same channels is not proportionate.
| Approach | Scope | Outcome |
|---|---|---|
| On-chain blockchain registries | ENS · Unstoppable Domains · Lens Protocol · Farcaster · OpenSea · Etherscan + Arkham — 12 brand strings × 6 registries = 72 lookups | Zero results No operator presence in any public Web3 namespace. Cryptocurrency pitch is server-side theatre, not genuine on-chain activity. |
| Public document repositories | Scribd · SlideShare · Academia.edu · Pastebin · GitHub — all operator brand and personal-name strings | Zero results Deliberate-low-footprint posture confirmed. No pitch decks, term sheets, or internal docs in public repositories. |
| WhatsApp — regulator-flagged numbers | +971 54 997 8780 (Trade Mirage HR) and all brand-associated lines |
Deactivated Selective-scrub pattern confirmed. Operator disabled brand-associated lines post-ADGM/FSRA alert while keeping live leadership funnel numbers active. |
| UAE public corporate registers (open web) | MOE · MOHRE · ADGM · DIFC public-search interfaces | Partial Registration existence confirmed; beneficial ownership hidden behind authenticated/subpoena barrier. No further yield possible without formal process. |
These lines of inquiry remain viable but require additional resource, access, or a trigger event before proceeding.
| Thread | What it requires | Expected yield |
|---|---|---|
| Reverse-image search — Dilshad face photo | PimEyes / Yandex Image / Google Lens run | Additional identity confirmations; undisclosed investor-facing profiles or prior-brand appearances |
| MEGA APP LAUNCH — 54-video playlist | Transcript extraction + speaker-name inventory | Full affiliate / influencer network map; commissionable agents for victim outreach |
| Indian MCA register | Lookups: Coders Bunch · Metric Motive · Getlead Analytics Pvt Ltd | Director network; registered capital; beneficial ownership chain for Calicut operations arm |
| Thai DBD register | Lookup: Mag Nexa Co. Ltd, Bangkok | Confirms or refutes "flagship luxury resort development in Thailand" construction claim |
| Dubai RTA register | Lookup: Mirage by Mag Car Rental L.L.C. fleet & depot | Fleet count, RTA licence status — corroborates or refutes operational legitimacy claim |
| Credential breach databases | HIBP · Dehashed · IntelX (paid) — 3 humble-beginnings Gmails | Password reuse, alternative accounts, earlier usernames, linked phone numbers |
| WhatsApp sweep — remaining phones | Manual test: 8 untested numbers from consolidated 14-phone inventory | Maps current operational communications posture post-seizure |
| Wayback Machine preservation | /save/ submissions — 5 live self-incrimination pages on matajargroup.com | Legally-admissible archived copies; protects exhibits against operator takedown before regulator acts |
Forensic imaging of both seized devices is the single highest-yield action available and carries no external cost beyond investigator time and write-blocking hardware. It must precede every other resource-intensive step on this list.
| Device | Expected contents once imaged | Priority |
|---|---|---|
| Dell PowerEdge R730 VMware ESXi · RAID array · 2U rack |
Guest VM filesystems containing: forex platform application database (trades ledger, balances, user accounts = complete victim list), internal CRM, call-centre records, communications archives, deleted financial records, possible cryptocurrency wallet files and exchange API keys, payment-processor integration credentials | Critical — image first |
| Mac PC Air-gapped at seizure · unknown OS |
Operator iMessage / WhatsApp Desktop / email archives, design and marketing assets, macOS Keychain credential store, Safari / Chrome browser history, possible screen recordings, local file sync caches (Dropbox / iCloud) | High — image second |
Recommended tooling: FTK Imager (free, Windows) or dc3dd to write-blocked target drives. All images must be verified with SHA-256 before analysis. Chain-of-custody log must record: examiner, date/time, source device serial, image hash, and storage location of master copy.
The R730 will contain mechanical SATA or SAS drives in a RAID configuration. The appropriate recovery approach depends entirely on physical and logical drive condition, which cannot be assessed without first attempting standard imaging.
| Drive condition (determined at imaging) | Recovery approach | Estimated cost | Recommendation |
|---|---|---|---|
| Intact · RAID online or reconstructible | Standard forensic imaging + RAID reconstruction + file-system parsing (Autopsy / Sleuth Kit) | £0–500 (investigator time, free tools) | Proceed immediately |
| Quick-format · logical wipe (partition table overwritten, data intact) | File carving on raw image — PhotoRec / Scalpel typically recover 50–80% of file content | £0 (PhotoRec / Scalpel are free) | Attempt before paying anything |
| Full overwrite (dd-zero or multi-pass wipe) | Specialist recovery is unlikely to yield meaningful data. Confirmed deletion is itself evidentially significant — documents deliberate concealment | £800–6,000 (largely irrecoverable) | Do not commission — document the wipe instead |
| Physical damage — head crash, seized spindle, platter scoring | Clean-room specialist (Ontrack / DriveSavers / Vogon International) | £1,000–8,000 per drive · 3–8 weeks | Commission only if case reaches prosecution stage |
The on-chain audit confirmed zero operator presence in public Web3 namespaces. This does not rule out cryptocurrency involvement — it means no wallet addresses have been identified yet. The only known on-chain lead is "Coinbase" written in the seized notebook (page 53). Blockchain combing is therefore address-finding first, chain-tracing second: seed addresses must come from hardware imaging, subpoenas, or victim disclosures before analytics tools can be applied meaningfully.
| Tool / Service | Use case | Monthly cost | Weekly equiv. |
|---|---|---|---|
| Arkham Intelligence | Entity labelling, address clustering, cross-chain coverage. First tool to deploy once a seed address is found. | Free / ~$50 upgrade | ~$12 |
| Nansen | Wallet profiling, DeFi/EVM exposure, whale-wallet alerts. Deploy alongside Arkham for ERC-20 chains. | ~$150 (Starter) | ~$37 |
| Etherscan / BSCScan / Tronscan | Manual tracing and transaction-graph building — free, time-intensive, sufficient for initial hypothesis | Free | £0 |
| Chainalysis Reactor | LEA-grade professional tracing with attribution database. Appropriate at prosecution/asset-confiscation stage only. | ~$1,250–2,500 (enterprise) | Not applicable pre-prosecution |
| Coinbase / Binance formal subpoena | The only authoritative path to confirmed accounts, KYC data, and transaction history | Legal cost only | N/A — formal legal process required |
Three parallel paths are available based on evidence compiled to date. They are not mutually exclusive; the choice of sequencing is an executive and legal-counsel decision.
| Path | Documentary threshold met? | Next required action | Expected outcome |
|---|---|---|---|
| A — Regulatory referral Immediate |
Yes — today | Package §1–§34 + 5 self-incrimination exhibits → submit to ADGM/FSRA · SCA · DFSA · FRA Egypt · BaFin Germany · RBI India · ED India | Freeze orders, public consumer warnings, coordinated multi-jurisdiction regulatory action. Operators lose licences and public-facing infrastructure. |
| B — Criminal prosecution Hardware-gated |
Not yet | Hardware imaging → identified financial records → subpoena chain (Coinbase · Apple · AWS S3) → traced-money evidence → UAE / German / Indian prosecution referral | Custodial sentences, criminal asset confiscation, operator extradition exposure. Requires £15,000–50,000+ in sustained legal and forensic investment. |
| C — Civil asset recovery Victim-list-gated |
Not yet | Hardware imaging for victim database → identify assets under operator control → freezing injunction + civil judgment in UAE or England | Direct financial recovery for identified victims. Costs recoverable if assets are found and freezing is achieved pre-dissipation. |
The investigative findings documented in this report create a foundation for a purpose-built intelligence infrastructure. The following steps represent a natural continuation of this work — moving from a one-time forensic report to a persistent, queryable system for ongoing case management, evidence organisation, and regulatory submission.
Each item below is a discrete, scoped engagement. None is required to use the findings already delivered. All are available on request.
Design of the core processing logic for a custom MCP (Model Context Protocol) server tailored to this case. Covers request routing, tool-call handling, failure recovery, and the intelligence layer that determines how queries against case data are resolved. This is bespoke per engagement — no off-the-shelf equivalent exists for investigation-grade workflows.
Schema design for all evidence classes captured in this investigation: entities, domains, phones, emails, financial flows, corporate structures, social media artefacts, and chain-of-custody records. A well-modelled schema at this stage eliminates re-indexing costs later and is a prerequisite for any reliable regulatory submission package.
Selection and configuration of the appropriate storage stack — vector database, relational, hybrid, or cache-layer — and design of the read/write paths that serve the intelligence layer. This decision directly controls per-query latency and ongoing API cost. Poorly architected retrieval at this stage creates compounding infrastructure debt.
Before any build begins, Divergence Systems can model your expected monthly spend across inference, storage, and retrieval — in three scenarios (conservative / expected / peak) — and size the architecture to the budget, not the other way around.
This projection is only as accurate as the brief. To produce a meaningful number we need to understand the objective: what data is being accessed, how often, by whom, and what a successful outcome looks like.
If you would like to progress any of the above, Divergence Systems can organise a scoped quote — typically returned within 48 hours of receiving a brief.
Contact: info@divergence.systems
Appendix A — Social-media captures (2026-05-05 batch) — full inline render of
case-archive/archive/15_social_media_captures.md.
Appendix B — Notebook digitisation (81 pages) — full inline render of
documents-analysis.md.
Appendix C — Photo evidence inventory — thumbnail grid with EXIF metadata.
Appendix D — YouTube channel index — table of 142 videos with key transcript keywords.
Appendix E — Update log — append the standalone-HTML build step.
Appendix F — Glossary.
Appendix G — How this report was produced — methodology & tools.
Every numbered footnote anchor points back to a specific archive file at
project/case-archive/archive/. Open any file in a Markdown viewer for
the full source-attributed material that backs the claim above.
01_adgm_alert.md — ADGM/FSRA fraud alert (2025-12-04).02_etrade_miragebrokerage_net.md — Egyptian Mirage Brokerage's etrade- site.03_dennis_poschner_search_results.md — Dennis Poschner public-record findings.04_coreto_ag.md — Coreto AG corporate verification, R960 invoice.05_trademirage_zoryacapital_review.md — third-party scam review of trademirage.com.06_whois_three_mirage_domains.md — WHOIS for 4 operator domains.07_matajar_group_parent_entity.md — Matajar Group parent-entity breakthrough.08_dhilshad_personal_profile.md — Muhammed Dhilshad personal-profile dossier.09_mirage_development_unrelated.md — Mirage Development (Abu Dhabi consultancy) — unrelated.10_mirage_brokerage_co_linkedin.md — Mirage Brokerage Co LinkedIn page (47 employees).11_mirage_brokerage_play_store_app.md — Mirage Brokerage Co Play Store app.12_arizona_llc_mirage_brokerage.md — Arizona LLC + Anthony Maggio.13_mirage_by_mag_corporate_family.md — three "Mirage by MAG" sister LLCs + D Express scheme.14_brand_confusion_disambiguation.md — brand-collision exclusions + NEXA Bali affinity-fraud lead.15_social_media_captures.md — 2026-05-05 social-media public-layer capture.16_research_pass_5tracks.md — five-track research pass: yt-dlp title-mining + sister-subsidiary deep dives (Mirage International Trading 2006, Mirage by MAG since 2010, Wholzale.com, Vansale by Bizfuel, Moms & Wives MLM, GetLead CRM Calicut, Shafeeq Moossa Sharjah/JAFZA links, second Dubai office).17_firecrawl_advertiser_pass.md — Firecrawl content capture of every operator domain + Meta Ad Library + Google Ads Transparency + Wayback availability: "MIRAGE HOLDING INVESTMENT" brand identity, verbatim 5-tier yield-ladder, Meta ads still active 134 days post-ADGM alert, 0 Google ads, NEVER archived on Wayback (anomaly).18_code_level_and_operator_history.md — code-level scan (no on-chain wallets in operator HTML; "Coinbase" named in notebook p.53 as routing exchange; 17-coin shortlist p.52); Dilshad's family origin established at Sharjah Gold Souk early-2000s; 3 new operator domains (magnexa.ai, do-verify.com, metricmotive.ai); Do-Verify misrepresented as KYC; Bangkok phone + UAE landline + new emails captured.19_dns_and_advertiser_tokens.md — current + historical DNS records for 22 operator domains; advertiser-platform verification tokens (Microsoft 365 tenant MS=ms83057961, Facebook Business Manager, Google site verification); zero analytics pixels despite 100+ active Meta ads; 3 operator domains DNS-decommissioned post-seizure (e36-verdeck.de, wholzale.com, baqalat.express).20_phone_pdf_negative_findings.md — phone × PDF / Scribd / SlideShare / Academia / Pastebin / GitHub negative-finding pass; Taryam Omran Investments (Sharjah, toh.ae) brand-shadow lead (operator alias "Bintaryam" = bin Taryam); deliberate-low-footprint posture confirmation.21_consolidated_fb_appstore_brandshadow.md — consolidated batch (FB Page intel + App Store / Play Store dev accounts + Google Business profiles + 4-instance brand-shadow signature + 5 self-incrimination exhibits on matajargroup.com + 14-phone consolidated inventory + WhatsApp selective-scrub pattern + 12-email inventory + Dilshad face photo + @Momsandwives YouTube yt-dlp mirror 206 videos + Dubai Vartha 17 May 2021 paid feature + 8 operational unsophistication signals).22_onchain_deadend_and_india_trail.md — on-chain audit (ENS + Unstoppable + Lens + Farcaster + OpenSea + Etherscan + Arkham — confirmed zero operator presence) + India trail consolidation (Calicut as operations origin, Indian MCA disclosure path, Kerala State Police cyber-crime route, Dubai Vartha disclosure target) + matajargroup.com self-incrimination corpus in regulator-hand-off form + forensic-imaging path forward + subpoena targets matrix + case readiness summary.23_dead_ends_and_next_steps.md — confirmed dead ends registry (4 closed tracks), interrupted threads registry (8 open threads), hardware imaging priority framework (R730 + Mac PC), mechanical hard drive specialist recovery decision matrix (cost/benefit at each damage tier), blockchain analytics tool comparison and weekly budget rationale, and three-path executive decision framework (Path A: regulatory referral; Path B: criminal prosecution; Path C: civil recovery).