Indeed. Libpcap based tools (Wireshark, tcpdump, snort etc.) receive the
timestamp from libpcap, which, in turn, receives it from the network system
in the OS. This is usually sometime _after_ the network device receives the
packet since many non-specialized cards do not support hardware time stamping.
When a tool receives the replayed packets, the timestamps on the packets
_received_ (from replaying interface) will "reflect the timestamps at the
time of replay" and not of the timestamps of the original trace.
This was just a misunderstanding :)