(2) In any county in which any violator had control or possession of any proceeds of the violation or of any books, records, documents, property, financial instrument, computer software, computer program, or other material, objects, or items which were used in furtherance of the violation; and