mask brute force

I want to know what is the instance on Amazon aws for crack the wpa2 key 22000 ? 
i want to test this one  : hashcat.exe -m 22000 -a 3  handshake.hc22000 a?a?a?a?a?a?a?a?
or the command for only a-z and 0-9. How long it takes ? thanks.
?a?a?a?a?a?a?a?a = 6634204312890625 passwords to test.
Hash-Mode 22000 (WPA-PBKDF2-PMKID+EAPOL) [Iterations: 4095] on AWS g5.12xlarge (4 GPU's, $5.672 per hour) runs at roughly 4000 kilo hashes per second

Meaning on AWS g5.12xlarge it will take about 53 years to complete.

Only a-z and 0-9 (?d?l) for 8 characters is 2821109907456 passwords to test. This would only take only 8 days and cost around 1 million dollars.
Damn only a 1-million payout in 8 days? I should be renting my equipment, I'd be rich!

Eitherway, testing only a-z and 0-9 would require creating a custom character list by using -1 and applying its parameters for lowercase and digits.

So your attack would essentially be:

hashcat.exe -m 22000 -a 3 -1 l?d? handshake.hc22000 1?1?1?1?1?1?1?1?

As for the logic behind trying a bruteforce of 8 is kind of beyond my knowledge unless you know something I don't. Seems like a waste of time to me.
@DanielG so you think it's impossible to bruteforce a wpa2 key ?

@slyexe with this command : hashcat.exe -m 22000 -a 3 -1 l?d? handshake.hc22000 1?1?1?1?1?1?1?1?
How long it's take with AWS g5.12xlarge ?