A command line deleting files used the time-out or ping commands to delay the file deletion. This is suspicious, as malware sometimes use these techniques to cover their tracks.
Evade security controls and possibly cover their tracks.
Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.