1) ollydbg v2 does not have a command-line interface natively (third party plugins are available which provide the functionality)
2) ollydbg has quirks running in 64 bit machine under wow layer (ollydbg is 32 bit 64 bit not released yet )
3) there is an actively developed opensource project for 64 bit called x64dbg (interface similar to ollydbg but using Qt )
you can give it a try
4) BaseProcessStart is xp for vista+ os use ntdll.RtlUserThreadStart
5) ctrl+g type RtlUserThreadStart -> follow Label -> hit f2 to set a break point -> f9
This Function Is a kernel mode call back and is invoked via NtContinue as such you will not have a stacktrace the arguments to this function are in registers Eax, Ebx in 32 bit viz AddressOfEntryPoint and PEB (Process Environment Block)

ollydbg has a watch window use ALT+V or view Watches add watches as needed
tile windows to keep watch window visible and trace

of course there is no match to windbg guis cant compete with console
you can stop even before kernel32 is loaded in the process even before peb is created
C:\>cdb -xe ld:ntdll calc
Code:
Microsoft (R) Windows Debugger Version 10.0.17763.132 X86
ModLoad: 00ba0000 00c60000 calc.exe
ModLoad: 77370000 774ac000 ntdll.dll
eax=00bb2d6c ebx=7ffd5000 ecx=00000000 edx=00000000 esi=00000000 edi=00000000
eip=773b70d8 esp=000dfbe4 ebp=00000000 iopl=0 nv up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000200
ntdll!RtlUserThreadStart: <<<<<<<
773b70d8 89442404 mov dword ptr [esp+4],eax ss:0023:000dfbe8=00000000
ntdll is loaded now
Code:
0:000> lm
start end module name
00ba0000 00c60000 calc (deferred)
77370000 774ac000 ntdll (pdb symbols) e:\symbols\ntdll.pdb\CD4062A231154A17A18DAE7D1A0FBACC2\ntdll.pdb
you can catch loading of kernel32.dll if you set a break here
Code:
0:000> bp ntdll!LdrLoadDll
0:000> g
Breakpoint 0 hit
eax=000df7ec ebx=7ffd5000 ecx=773d36f6 edx=7744cd48 esi=773d7de0 edi=00000000
eip=773d22ae esp=000df738 ebp=000df8a4 iopl=0 nv up ei pl zr na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
ntdll!LdrLoadDll:
773d22ae 8bff mov edi,edi
0:000> kb
ChildEBP RetAddr Args to Child
000df734 773d7d33 00000000 00000000 773d7de0 ntdll!LdrLoadDll
000df8a4 773d60a7 000df918 77370000 74445d42 ntdll!LdrpInitializeProcess+0xfe7
000df8f4 773d3659 000df918 77370000 00000000 ntdll!_LdrpInitialize+0x78
000df904 00000000 000df918 77370000 00000000 ntdll!LdrInitializeThunk+0x10
0:000> g
ModLoad: 76e00000 76ed4000 C:\Windows\system32\kernel32.dll
Breakpoint 0 hit
eax=773d22ae ebx=00000000 ecx=000df1a0 edx=00000062 esi=773c8b19 edi=000df1c0
eip=773d22ae esp=000df184 ebp=000df1ac iopl=0 nv up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202
ntdll!LdrLoadDll:
773d22ae 8bff mov edi,edi
0:000> g
system break point is so far below it will take ages to reach here if you single step 
Code:
ntdll!LdrpDoDebuggerBreak+0x2c:
774105a6 cc int 3
0:000>
Bookmarks