Skip to main content

GGX Gold completes C.O.D vein drilling

Published by , Assistant Editor
Global Mining Review,


Ximen Mining Corp.(Ximen) announces its option partner, GGX Gold Corp., has completed 32 diamond drill holes on the C.O.D. vein and has moved the drill rig to start drilling the C.O.D. North Vein at the Gold Drop property in the Greenwood Mining Camp.

 

The drill rig has now completed the first stage of in-fill drilling on the C.O.D. vein.  The rig has now been moved to explore the C.O.D. North vein, which is a parallel vein located 700 m northeast of the main vein. Trench samples collected in 2018 from the C.O.D. North vein assayed up to 21.7 g/t gold over 0.4 m. An initial stage of 10 holes is planned to test the structure in the area of the surface trenches.

Since the start of the season in mid-April, 32 holes for a total of 1923 m have been completed on the main C.O.D. structure.  Fourteen holes intersected the C.O.D. quartz vein at the target depths containing variable amounts of pyrite mineralisation. Five vein intercepts were visibly mineralised with possible gold-telluride mineralisation (sylvanite, (Ag, Au)Te2) and one other intercept contained visible gold.

Following on from the C.O.D. North structure, the drill program will continue this season with planned holes to test the Everest vein, a visible gold bearing vein that was discovered in 2018, and the Gold Drop mine, where visible gold in quartz has been identified in surface exposures.

The drill core is currently being logged and cut in half with a diamond saw at a facility in Greenwood, B.C.  Half of the core samples will be shipped for assay later this month.

Dr. Mathew Ball, P.Geo., VP Exploration for Ximen Mining Corp. and a Qualified Person as defined by NI 43-101, approved the technical information contained in this news release.

Read the article online at: https://www.globalminingreview.com/exploration-development/25062019/ggx-gold-completes-cod-vein-drilling/

You might also like

 
 

Embed article link: (copy the HTML code below):