TABLE 1.
Primer | Sequence (5′-3′)a | Application |
---|---|---|
SLA-TL-M-F | CAGACTGCGAgtcTTCGAGTTTGAAGCG | To introduce mutations into SLA top loop |
SLA-TL-M-R | ATTCACACAGATCAACAAC | |
SLA-S2-M1-F | AAGCTAGCAAgacTATCAACAGGTTTTATTTTG | To introduce mutations to disrupt the stem 2 of SLA |
SLA-S2-M1-R | TCGCTTCAAACTCGAACTG | |
SLA-S2-M2-F | AGTTGTTGATgtcTGTGAATCAGACTG | To introduce mutations to restore the stem 2 of SLAb |
SLA-S2-M2-R | CTATAGTGTCACCTAAATGC | |
5′-CS-M-F | AAGCTAGCAAcattgTATCAACAGG | To introduce mutations into 5′ cyclization sequence |
5′-CS-M-R | TCGCTTCAAACTCGAACTG | |
3′-CS-M-F | ACGCAAAACAcaatgTTGACGCTGGGAAAGACCAG | To introduce mutations into 3′ cyclization sequence |
3′-CS-M-R | TTTCCGGGGGGTCTCCTC | |
GAA-F | AGTCAGTGGAgcagcaTGCGTTGTGAAGC | To introduce mutations into the GDD motif of NS5 |
GAA-R | GCCATTCGTTTGAGCCTA |
Mutations are indicated in boldface letters.
This mutant was achieved based on pregenerated SLA-S2-M1 mutant.