as I'm diving into the reverse engineering topic, I was wondering: is there any way (if possible) to have the same level of details, regarding Windows APIs Stack setup and arguments (highlighted in the Immunity image) within x64dbg?
You may try xAnalyzer, you can download it here: https://github.com/ThunderCls/xAnalyzer