(2) In which any violator had control or possession of any proceeds of the violation or of any book, record, document, property, financial instrument, computer software, computer program, data, or other material or object that was used in furtherance of the violation;