Short answer: No, you’d have to manually run !wmitrace.logdump on each logger ID and search the output.
Long answer: Those are all ETW and WPP loggers, so the metadata describing the event (including strings) aren’t actually logged. You need to match them up with the corresponding manifest file (ETW) or TMF (WPP) to interpret the events. !wmitrace.logdump will automatically do this for you for providers it knows about (e.g. EventLog-System). For custom providers you need to provide the manifest or TMF yourself and use !wmitrace.searchpath and/or !wmitrace.manpath to see the logs.