Use GetModuleHandleW to avoid *A functions where possible.
diff --git a/Modules/posixmodule.c b/Modules/posixmodule.c
index a71d2e6..61a0439 100644
--- a/Modules/posixmodule.c
+++ b/Modules/posixmodule.c
@@ -1155,7 +1155,7 @@
     /* only recheck */
     if (!has_GetFinalPathNameByHandle)
     {
-        hKernel32 = GetModuleHandle("KERNEL32");
+        hKernel32 = GetModuleHandleW(L"KERNEL32");
         *(FARPROC*)&Py_GetFinalPathNameByHandleA = GetProcAddress(hKernel32,
                                                 "GetFinalPathNameByHandleA");
         *(FARPROC*)&Py_GetFinalPathNameByHandleW = GetProcAddress(hKernel32,
@@ -6526,7 +6526,7 @@
     /* only recheck */
     if (has_CreateSymbolicLinkW)
         return has_CreateSymbolicLinkW;
-    hKernel32 = GetModuleHandle("KERNEL32");
+    hKernel32 = GetModuleHandleW(L"KERNEL32");
     *(FARPROC*)&Py_CreateSymbolicLinkW = GetProcAddress(hKernel32,
                                                         "CreateSymbolicLinkW");
     if (Py_CreateSymbolicLinkW)
@@ -9365,7 +9365,7 @@
 
         /* Obtain handle to the DLL containing CryptoAPI
            This should not fail         */
-        hAdvAPI32 = GetModuleHandle("advapi32.dll");
+        hAdvAPI32 = GetModuleHandleW(L"advapi32.dll");
         if(hAdvAPI32 == NULL)
             return win32_error("GetModuleHandle", NULL);
 
diff --git a/PC/frozen_dllmain.c b/PC/frozen_dllmain.c
index e1e4eda..0156c50 100644
--- a/PC/frozen_dllmain.c
+++ b/PC/frozen_dllmain.c
@@ -118,7 +118,7 @@
     BOOL (WINAPI * pfndllmain)(HINSTANCE, DWORD, LPVOID);
 
     char funcName[255];
-    HMODULE hmod = GetModuleHandle(NULL);
+    HMODULE hmod = GetModuleHandleW(NULL);
     strcpy(funcName, "_DllMain");
     strcat(funcName, modName);
     strcat(funcName, "@12"); // stdcall convention.
diff --git a/PC/winreg.c b/PC/winreg.c
index 56bda5c..451ced2 100644
--- a/PC/winreg.c
+++ b/PC/winreg.c
@@ -1066,7 +1066,7 @@
 
     /* Only available on 64bit platforms, so we must load it
        dynamically. */
-    hMod = GetModuleHandle("advapi32.dll");
+    hMod = GetModuleHandleW(L"advapi32.dll");
     if (hMod)
         pfn = (RDKEFunc)GetProcAddress(hMod,
                                                                    "RegDeleteKeyExW");
@@ -1590,7 +1590,7 @@
 
     /* Only available on 64bit platforms, so we must load it
        dynamically.*/
-    hMod = GetModuleHandle("advapi32.dll");
+    hMod = GetModuleHandleW(L"advapi32.dll");
     if (hMod)
         pfn = (RDRKFunc)GetProcAddress(hMod,
                                        "RegDisableReflectionKey");
@@ -1626,7 +1626,7 @@
 
     /* Only available on 64bit platforms, so we must load it
        dynamically.*/
-    hMod = GetModuleHandle("advapi32.dll");
+    hMod = GetModuleHandleW(L"advapi32.dll");
     if (hMod)
         pfn = (RERKFunc)GetProcAddress(hMod,
                                        "RegEnableReflectionKey");
@@ -1663,7 +1663,7 @@
 
     /* Only available on 64bit platforms, so we must load it
        dynamically.*/
-    hMod = GetModuleHandle("advapi32.dll");
+    hMod = GetModuleHandleW(L"advapi32.dll");
     if (hMod)
         pfn = (RQRKFunc)GetProcAddress(hMod,
                                        "RegQueryReflectionKey");